From owner-svn-doc-head@FreeBSD.ORG Sun Feb 1 08:10:44 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 2859074C; Sun, 1 Feb 2015 08:10:44 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 142C0361; Sun, 1 Feb 2015 08:10:44 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t118Ah0n013325; Sun, 1 Feb 2015 08:10:43 GMT (envelope-from jgh@FreeBSD.org) Received: (from jgh@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t118AhgQ013324; Sun, 1 Feb 2015 08:10:43 GMT (envelope-from jgh@FreeBSD.org) Message-Id: <201502010810.t118AhgQ013324@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: jgh set sender to jgh@FreeBSD.org using -f From: Jason Helfman Date: Sun, 1 Feb 2015 08:10:43 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46248 - head/en_US.ISO8859-1/books/handbook/security X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 01 Feb 2015 08:10:44 -0000 Author: jgh Date: Sun Feb 1 08:10:43 2015 New Revision: 46248 URL: https://svnweb.freebsd.org/changeset/doc/46248 Log: - fix typo PR: 197052 Differential Revision: https://reviews.freebsd.org/D1735 Submitted by: danilo@ Approved by: bcr (mentor) Modified: head/en_US.ISO8859-1/books/handbook/security/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/security/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/security/chapter.xml Sat Jan 31 07:00:56 2015 (r46247) +++ head/en_US.ISO8859-1/books/handbook/security/chapter.xml Sun Feb 1 08:10:43 2015 (r46248) @@ -2110,7 +2110,7 @@ Connection closed by foreign host.IP Payload Compression Protocol (IPComp): this protocol tries to increase communication performance by compressing - the IP payload in order ro reduce the + the IP payload in order to reduce the amount of data sent. From owner-svn-doc-head@FreeBSD.ORG Sun Feb 1 12:11:55 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 7576D341; Sun, 1 Feb 2015 12:11:55 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 60F49D81; Sun, 1 Feb 2015 12:11:55 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t11CBtMg048283; Sun, 1 Feb 2015 12:11:55 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t11CBtMr048282; Sun, 1 Feb 2015 12:11:55 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201502011211.t11CBtMr048282@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Sun, 1 Feb 2015 12:11:55 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46249 - head/ja_JP.eucJP/share/xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 01 Feb 2015 12:11:55 -0000 Author: ryusuke Date: Sun Feb 1 12:11:54 2015 New Revision: 46249 URL: https://svnweb.freebsd.org/changeset/doc/46249 Log: - Merge the following from the English version: r46219 -> r46245 head/ja_JP.eucJP/share/xml/news.xml Modified: head/ja_JP.eucJP/share/xml/news.xml Modified: head/ja_JP.eucJP/share/xml/news.xml ============================================================================== --- head/ja_JP.eucJP/share/xml/news.xml Sun Feb 1 08:10:43 2015 (r46248) +++ head/ja_JP.eucJP/share/xml/news.xml Sun Feb 1 12:11:54 2015 (r46249) @@ -23,7 +23,7 @@ would like to work on. *** $FreeBSD$ - Original revision: r46219 + Original revision: r46245 --> @@ -71,6 +71,11 @@

新コミッタ就任: Muhammad Moinur Rahman (ports)

+ + +

新コミッタ就任: + Eric Joyner (src)

+
From owner-svn-doc-head@FreeBSD.ORG Mon Feb 2 12:18:44 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 31DC7E9F; Mon, 2 Feb 2015 12:18:44 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 1D84DBBF; Mon, 2 Feb 2015 12:18:44 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t12CIhm7036532; Mon, 2 Feb 2015 12:18:43 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t12CIhMM036531; Mon, 2 Feb 2015 12:18:43 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201502021218.t12CIhMM036531@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Mon, 2 Feb 2015 12:18:43 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46250 - head/ja_JP.eucJP/books/handbook/linuxemu X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 02 Feb 2015 12:18:44 -0000 Author: ryusuke Date: Mon Feb 2 12:18:43 2015 New Revision: 46250 URL: https://svnweb.freebsd.org/changeset/doc/46250 Log: - Merge the following from the English version: r10327 -> r10823 head/ja_JP.eucJP/books/handbook/linuxemu/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/linuxemu/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/linuxemu/chapter.xml ============================================================================== --- head/ja_JP.eucJP/books/handbook/linuxemu/chapter.xml Sun Feb 1 12:11:54 2015 (r46249) +++ head/ja_JP.eucJP/books/handbook/linuxemu/chapter.xml Mon Feb 2 12:18:43 2015 (r46250) @@ -3,7 +3,7 @@ The FreeBSD Documentation Project The FreeBSD Japanese Documentation Project - Original revision: r10327 + Original revision: r10823 $FreeBSD$ --> @@ -720,7 +720,7 @@ export PATH SAP R/3 (4.6B - IDES) のインストール - HolgerKill寄稿: + HolgerKipp寄稿: @@ -735,6 +735,10 @@ export PATH SAP R/3 + SAP サポートチームは、 + 認定されたプラットフォームのみをサポートしているので、 + FreeBSD 上への SAP システムのインストールについてはサポートしていません。 + まえがき @@ -2049,6 +2053,98 @@ tape_address_rew = /dev/sa0tape_address_rew cpio と組み合わせて用いる巻き戻し可能なデバイス。 + + + インストール後の設定 + + 以下の SAP パラメータについてはインストール後に調整する必要があります。 + + + + + + 名前 + + + + + + ztta/roll_extension + 250000000 + + + abap/heap_area_dia + 300000000 + + + abap/heap_area_nondia + 400000000 + + + em/initial_size_MB + 256 + + + em/blocksize_kB + 1024 + + + ipc/shm_psize_40 + 70000000 + + + + + + SAP-Note 0013026: + + + + + + 名前 + + + + + + ztta/dynpro_area + 2500000 + + + + + + SAP-Note 0157246: + + + + + + 名前 + + + + + + rdisp/ROLL_MAXFS + 16000 + + + rdisp/PG_MAXFS + 30000 + + + + + + + 以上のパラメータと、1 ギガバイトのメモリを持つシステムでは、 + 以下のようなメモリ使用量となるでしょう。 + + Mem: 547M Active, 305M Inact, 109M Wired, 40M Cache, 112M Buf, 3492K Free + + From owner-svn-doc-head@FreeBSD.ORG Wed Feb 4 15:51:50 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 0E381265; Wed, 4 Feb 2015 15:51:50 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id EE7D2A7F; Wed, 4 Feb 2015 15:51:49 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t14FpnTQ007104; Wed, 4 Feb 2015 15:51:49 GMT (envelope-from mat@FreeBSD.org) Received: (from mat@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t14FpnYs007103; Wed, 4 Feb 2015 15:51:49 GMT (envelope-from mat@FreeBSD.org) Message-Id: <201502041551.t14FpnYs007103@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: mat set sender to mat@FreeBSD.org using -f From: Mathieu Arnold Date: Wed, 4 Feb 2015 15:51:49 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46251 - head/en_US.ISO8859-1/books/porters-handbook/makefiles X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 04 Feb 2015 15:51:50 -0000 Author: mat (ports committer) Date: Wed Feb 4 15:51:49 2015 New Revision: 46251 URL: https://svnweb.freebsd.org/changeset/doc/46251 Log: Add runtime to portmgr's blanket. Sponsored by: Absolight Modified: head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Mon Feb 2 12:18:43 2015 (r46250) +++ head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Wed Feb 4 15:51:49 2015 (r46251) @@ -2801,8 +2801,8 @@ - Trivial and tested build - fixes. + Trivial and tested build and + runtime fixes. From owner-svn-doc-head@FreeBSD.ORG Thu Feb 5 16:33:39 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 4ECD8DD9; Thu, 5 Feb 2015 16:33:39 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 35E8E66E; Thu, 5 Feb 2015 16:33:39 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t15GXddQ014120; Thu, 5 Feb 2015 16:33:39 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t15GXd2P014119; Thu, 5 Feb 2015 16:33:39 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201502051633.t15GXd2P014119@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Thu, 5 Feb 2015 16:33:39 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46252 - head/en_US.ISO8859-1/htdocs/releases/10.1R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Feb 2015 16:33:39 -0000 Author: gjb Date: Thu Feb 5 16:33:38 2015 New Revision: 46252 URL: https://svnweb.freebsd.org/changeset/doc/46252 Log: Regen after r278269 Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html Wed Feb 4 15:51:49 2015 (r46251) +++ head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html Thu Feb 5 16:33:38 2015 (r46252) @@ -1,10 +1,10 @@ -FreeBSD 10.1-RELEASE Errata

FreeBSD 10.1-RELEASE Errata

The FreeBSD Project

FreeBSD 10.1-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of - the FreeBSD Foundation.

Intel, - Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, - and Xeon are trademarks or registered trademarks of Intel Corporation - or its subsidiaries in the United States and other countries.

SPARC, SPARC64, and + the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, + i486, Itanium, Pentium, and Xeon are trademarks or registered + trademarks of Intel Corporation or its subsidiaries in the United + States and other countries.

SPARC, SPARC64, and UltraSPARC are trademarks of SPARC International, Inc in the United States and other countries. SPARC International, Inc owns all of the SPARC trademarks and under licensing agreements allows the proper use @@ -13,7 +13,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - symbol.

Last modified on 2014-11-11 by gjb.
Abstract

This document lists errata items for FreeBSD 10.1-RELEASE, + symbol.

Last modified on 2015-02-05 by gjb.
Abstract

This document lists errata items for FreeBSD 10.1-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information @@ -22,8 +22,8 @@ usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.

This errata document for FreeBSD 10.1-RELEASE will be - maintained until the release of FreeBSD 10.2-RELEASE.


1.Introduction

This errata document contains late-breaking - news about FreeBSD 10.1-RELEASE before installing this + maintained until the release of FreeBSD 10.2-RELEASE.


1.Introduction

This errata document contains late-breaking + news about FreeBSD 10.1-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.

Any version of this errata document actually distributed @@ -34,7 +34,14 @@ errata are located at http://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD 10.1-STABLE also contain up-to-date copies of this document (as of the time of - the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2.Security Advisories

AdvisoryDateTopic
No advisories.

3.Open Issues

2.Security Advisories

AdvisoryDateTopic
FreeBSD-SA-14:27.st dio10December2014

Buffer overflow in stdio

FreeBSD-SA-14:28.file10December2014

Multiple vulnerabilities in file(1) + and libmagic(3)

FreeBSD-SA-14:30.unbound17December2014

Remote denial of service + vulnerability

FreeBSD-SA-14:31.ntp23December2014

Multiple vulnerabilities in NTP + suite

FreeBSD-SA-15:01.openssl14January2015

Multiple vulnerabilities in + OpenSSL

FreeBSD-SA-15:02.kmem27January2015

SCTP kernel memory corruption and + disclosure vulnerability

FreeBSD-SA-15:03.sctp27January2015

SCTP stream reset + vulnerability

3.Errata Notices

ErrataDateTopic
FreeBSD-EN-14:13.freebsd-update23December2014

Fixed directory deletion issue in + freebsd-update(8)

4.Open Issues

  • FreeBSD/i386 10.1-RELEASE running as a guest operating system on VirtualBox can have a problem with disk I/O access. It depends on some specific hardware configuration and does not depend on a @@ -94,8 +101,8 @@ boot

    dvd1.iso installer.

Finally, bootstrap pkg(8) from the ISO, and install required packages:

# pkg bootstrap
-# pkg install xorg-server xorg gnome2 [...]

4.Late-Breaking News

No news.

This file, and other release-related documents, - can be downloaded from http://www.FreeBSD.org/releases/.

For questions about FreeBSD, read the +# pkg install xorg-server xorg gnome2 [...]

5.Late-Breaking News

No news.

This file, and other release-related documents, + can be downloaded from https://www.FreeBSD.org/snapshots/.

For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

All users of FreeBSD 10.1-STABLE should subscribe to the <stable@FreeBSD.org> From owner-svn-doc-head@FreeBSD.ORG Thu Feb 5 16:55:04 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 3C1E15B7; Thu, 5 Feb 2015 16:55:04 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 26529915; Thu, 5 Feb 2015 16:55:04 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t15Gt4U8024134; Thu, 5 Feb 2015 16:55:04 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t15Gt3Du024128; Thu, 5 Feb 2015 16:55:03 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201502051655.t15Gt3Du024128@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Thu, 5 Feb 2015 16:55:03 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46253 - in head/en_US.ISO8859-1/htdocs/releases: 10.0R 10.1R 8.4R 9.3R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Feb 2015 16:55:04 -0000 Author: gjb Date: Thu Feb 5 16:55:02 2015 New Revision: 46253 URL: https://svnweb.freebsd.org/changeset/doc/46253 Log: Synchronize the docbook.css stylesheet with what exists in the doc/ tree, which fixes a number of rendering nits. This is only being done for releases that are supported. Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/10.0R/docbook.css head/en_US.ISO8859-1/htdocs/releases/10.1R/docbook.css head/en_US.ISO8859-1/htdocs/releases/8.4R/docbook.css head/en_US.ISO8859-1/htdocs/releases/9.3R/docbook.css Modified: head/en_US.ISO8859-1/htdocs/releases/10.0R/docbook.css ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.0R/docbook.css Thu Feb 5 16:33:38 2015 (r46252) +++ head/en_US.ISO8859-1/htdocs/releases/10.0R/docbook.css Thu Feb 5 16:55:02 2015 (r46253) @@ -26,183 +26,378 @@ * $FreeBSD$ */ -BODY ADDRESS { - line-height: 1.3; - margin: .6em 0; +/* + * General DocBook styles from the DocBook XSL distribution + */ + +.formalpara-title { + font-weight: bold; +} + +a:link { + color:#0645AD; + text-decoration: underline; +} + +a:visited, a:hover, a:active { + color:#663366; + text-decoration: underline; +} + +div.blockquote-title { + font-weight: bold; + margin-top: 1em; + margin-bottom: 1em; +} + +span.msgmain-title { + font-weight: bold; +} + +span.msgsub-title { + font-weight: bold; +} + +span.msgrel-title { + font-weight: bold; +} + +div.msglevel, div.msgorig, div.msgaud { + margin-top: 1em; + margin-bottom: 1em; +} + +span.msglevel-title, span.msgorig-title, span.msgaud-title { + font-weight: bold; +} + +div.msgexplan { + margin-top: 1em; + margin-bottom: 1em; +} + +span.msgexplan-title { + font-weight: bold; } -BODY BLOCKQUOTE { - margin-top: .75em; - line-height: 1.5; - margin-bottom: .75em; +div.figure-title { + font-weight: bold; } -HTML BODY { +div.example-title { + font-weight: bold; +} + +div.equation-title { + font-weight: bold; +} + +div.table-title { + font-weight: bold; +} + +div.sidebar-title { + font-weight: bold; +} + +div.synopsis { + white-space: pre; + font-family: monospace; +} + +/* + * FreeBSD-specific formatting + */ + +body address { + line-height: 1.3; + margin: .6em 0; +} + +html body { margin: 1em 8% 1em 10%; line-height: 1.2; } -.LEGALNOTICE { +@media screen { + html body { font-family: sans-serif; } +} + +@media print { + html body { font-family: serif; } +} + +.legalnotice { font-size: small; font-variant: small-caps; } -BODY DIV { +body div { margin: 0; } -DL { - margin: .8em 0; +dl { + margin: .4em 0 0 0; line-height: 1.2; } -BODY FORM { +dt { + font-weight: bold; + margin: 0.4em 0 0 0; +} + +div.abstract div.abstract-title, +div.toc div.toc-title, +div.list-of-figures div.toc-title, +div.list-of-tables div.toc-title, +div.list-of-examples div.toc-title { + font-size: 115%; +} + +div.calloutlist dt { + float: left; + width: 1em;} + +div.calloutlist dd { + clear: right; + margin-bottom: 1ex; +} + +body .calloutlist td { + padding-right: 0.5em; + width: auto; +} + +body .calloutlist td p { + line-height: 1.2; + margin-top: 4px; + margin-bottom: 4px; +} + +body form { margin: .6em 0; } -H1, H2, H3, H4, H5, H6, -DIV.EXAMPLE P B, -.QUESTION, -DIV.TABLE P B, -DIV.PROCEDURE P B { +div.example p b, +.question, +div.table p b, +div.procedure p b { color: #990000; } -BODY H1, BODY H2, BODY H3, BODY H4, BODY H5, BODY H6 { +h1.title, h2.title, h3.title, h4.title, h5.title, h6.title, +h3.author, .corpauthor, +div.abstract div.abstract-title, +div.toc div.toc-title, +div.list-of-figures div.toc-title, +div.list-of-tables div.toc-title, +div.list-of-examples div.toc-title { + font-weight: bold; line-height: 1.3; + margin-top: 1em; margin-left: 0; + color: #990000; } -BODY H1, BODY H2 { +h1.title, h2.title { margin: .8em 0 0 -4%; } -BODY H3, BODY H4 { +h3.title, h4.title { margin: .8em 0 0 -3%; } -BODY H5 { +h5.title { margin: .8em 0 0 -2%; } -BODY H6 { +h6.title { margin: .8em 0 0 -1%; } -BODY HR { +body hr { margin: .6em; border-width: 0 0 1px 0; border-style: solid; border-color: #cecece; } -BODY IMG.NAVHEADER { +body img.navheader { margin: 0 0 0 -4%; } -OL { - margin: 0 0 0 5%; +ol { + margin: 0 0 0 1em; line-height: 1.2; } -BODY PRE { +body pre { margin: .75em 0; - line-height: 1.0; font-family: monospace; } -BODY TD, BODY TH { +body td, body th { line-height: 1.2; + padding-right: 1.5em; } -UL, BODY DIR, BODY MENU { - margin: 0 0 0 5%; +ul, body dir, body menu { + margin: 0 0 0 1em; line-height: 1.2; } -HTML { - margin: 0; +html { + margin: 0; padding: 0; } -BODY P B.APPLICATION { - color: #000000; +.filename { + color: #007a00; } -.FILENAME { +.package, .port { + color: #007a00; + font-family: monospace; + font-style: italic; +} + +.svnref { color: #007a00; } -.GUIMENU, .GUIMENUITEM, .GUISUBMENU, -.GUILABEL, .INTERFACE, -.SHORTCUT, .SHORTCUT .KEYCAP { +.guimenu, .guimenuitem, .guisubmenu, +.guilabel, .interface, +.shortcut, .shortcut .keycap { font-weight: bold; } -.GUIBUTTON { +.guibutton { background-color: #CFCFCF; padding: 2px; } -.ACCEL { +.accel { background-color: #F0F0F0; text-decoration: underline; -} +} -.SCREEN { +pre.screen { + white-space: pre; + overflow: auto; + font-family: monospace; padding: 1ex; + background-color: #edc; + border: 1px solid #ccc; + border-radius: 4px; } -.PROGRAMLISTING { +pre.programlisting { + white-space: pre; + overflow: auto; + font-family: monospace; padding: 1ex; background-color: #eee; border: 1px solid #ccc; + border-radius: 4px; } @media screen { /* hide from IE3 */ a[href]:hover { background: #ffa } } -BLOCKQUOTE.NOTE { +.informaltable, .table th { + padding-left: 0.2em; + text-align: left; +} + +.note, .tip, .important, .warning, .caution, .example, div.procedure { + border-radius: 4px; + padding: 2ex 2ex 0 2ex; + margin: .75em 3em .75em 1em; + line-height: 1.3; +} + +.note, div.procedure { color: #222; background: #eee; border: 1px solid #ccc; - padding: 0.4em 0.4em; - width: 85%; + width: 90%; } -BLOCKQUOTE.TIP { +.tip { color: #004F00; background: #d8ecd6; border: 1px solid green; - padding: 0.2em 2em; - width: 85%; + width: 90%; } -BLOCKQUOTE.IMPORTANT { +.important { font-style:italic; border: 1px solid #a00; border-left: 12px solid #c00; - padding: 0.1em 1em; + width: 90%; } -BLOCKQUOTE.WARNING { +.warning { color: #9F1313; background: #f8e8e8; border: 1px solid #e59595; - padding: 0.2em 2em; - width: 85%; + width: 90%; } -.EXAMPLE { +.caution { + color: #3E3535; + background: #FFC; + border: 1px solid #e59595; + width: 90%; +} + +.example { background: #fefde6; border: 1px solid #f1bb16; - margin: 1em 0; - padding: 0.2em 2em; width: 90%; } -.INFORMALTABLE TABLE.CALSTABLE TR TD { +.admontitle { + display: inline; + line-height: 1; + margin-right: 0; +} + +.procedure-title { + font-weight: bold; + line-height: 1; + margin-right: 0; +} + +.note p, .tip p, .important p, .warning p, .caution p, { + display: inline; +} + +.informaltable table.calstable tr td { padding-left: 1em; padding-right: 1em; } + +.authorgroup { + font-style: italic; +} + +.userinput, +.userinput code { + font-weight: bold; +} + +pre.screen strong { + font-weight: normal; +} + +.procedure ol { + line-height: 1.2; + margin: 0 0 0 -1em; +} + +span.contrib { + font-size: small; + font-style: italic; +} Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/docbook.css ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.1R/docbook.css Thu Feb 5 16:33:38 2015 (r46252) +++ head/en_US.ISO8859-1/htdocs/releases/10.1R/docbook.css Thu Feb 5 16:55:02 2015 (r46253) @@ -26,187 +26,377 @@ * $FreeBSD$ */ -BODY ADDRESS { - line-height: 1.3; - margin: .6em 0; +/* + * General DocBook styles from the DocBook XSL distribution + */ + +.formalpara-title { + font-weight: bold; +} + +a:link { + color:#0645AD; + text-decoration: underline; +} + +a:visited, a:hover, a:active { + color:#663366; + text-decoration: underline; +} + +div.blockquote-title { + font-weight: bold; + margin-top: 1em; + margin-bottom: 1em; +} + +span.msgmain-title { + font-weight: bold; +} + +span.msgsub-title { + font-weight: bold; +} + +span.msgrel-title { + font-weight: bold; +} + +div.msglevel, div.msgorig, div.msgaud { + margin-top: 1em; + margin-bottom: 1em; +} + +span.msglevel-title, span.msgorig-title, span.msgaud-title { + font-weight: bold; +} + +div.msgexplan { + margin-top: 1em; + margin-bottom: 1em; +} + +span.msgexplan-title { + font-weight: bold; +} + +div.figure-title { + font-weight: bold; +} + +div.example-title { + font-weight: bold; +} + +div.equation-title { + font-weight: bold; } -BODY BLOCKQUOTE { - margin-top: .75em; - line-height: 1.5; - margin-bottom: .75em; +div.table-title { + font-weight: bold; } -HTML BODY { +div.sidebar-title { + font-weight: bold; +} + +div.synopsis { + white-space: pre; + font-family: monospace; +} + +/* + * FreeBSD-specific formatting + */ + +body address { + line-height: 1.3; + margin: .6em 0; +} + +html body { margin: 1em 8% 1em 10%; line-height: 1.2; } -.LEGALNOTICE { +@media screen { + html body { font-family: sans-serif; } +} + +@media print { + html body { font-family: serif; } +} + +.legalnotice { font-size: small; font-variant: small-caps; } -BODY DIV { +body div { margin: 0; } -DL { - margin: .8em 0; +dl { + margin: .4em 0 0 0; line-height: 1.2; } -BODY FORM { +dt { + font-weight: bold; + margin: 0.4em 0 0 0; +} + +div.abstract div.abstract-title, +div.toc div.toc-title, +div.list-of-figures div.toc-title, +div.list-of-tables div.toc-title, +div.list-of-examples div.toc-title { + font-size: 115%; +} + +div.calloutlist dt { + float: left; + width: 1em;} + +div.calloutlist dd { + clear: right; + margin-bottom: 1ex; +} + +body .calloutlist td { + padding-right: 0.5em; + width: auto; +} + +body .calloutlist td p { + line-height: 1.2; + margin-top: 4px; + margin-bottom: 4px; +} + +body form { margin: .6em 0; } -H1, H2, H3, H4, H5, H6, -DIV.EXAMPLE P B, -.QUESTION, -DIV.TABLE P B, -DIV.PROCEDURE P B { +div.example p b, +.question, +div.table p b, +div.procedure p b { color: #990000; } -BODY H1, BODY H2, BODY H3, BODY H4, BODY H5, BODY H6 { +h1.title, h2.title, h3.title, h4.title, h5.title, h6.title, +h3.author, .corpauthor, +div.abstract div.abstract-title, +div.toc div.toc-title, +div.list-of-figures div.toc-title, +div.list-of-tables div.toc-title, +div.list-of-examples div.toc-title { + font-weight: bold; line-height: 1.3; + margin-top: 1em; margin-left: 0; + color: #990000; } -BODY H1, BODY H2 { +h1.title, h2.title { margin: .8em 0 0 -4%; } -BODY H3, BODY H4 { +h3.title, h4.title { margin: .8em 0 0 -3%; } -BODY H5 { +h5.title { margin: .8em 0 0 -2%; } -BODY H6 { +h6.title { margin: .8em 0 0 -1%; } -BODY HR { +body hr { margin: .6em; border-width: 0 0 1px 0; border-style: solid; border-color: #cecece; } -BODY IMG.NAVHEADER { +body img.navheader { margin: 0 0 0 -4%; } -OL { - margin: 0 0 0 5%; +ol { + margin: 0 0 0 1em; line-height: 1.2; } -BODY PRE { +body pre { margin: .75em 0; - line-height: 1.0; font-family: monospace; } -BODY TD, BODY TH { +body td, body th { line-height: 1.2; + padding-right: 1.5em; } -UL, BODY DIR, BODY MENU { - margin: 0 0 0 5%; +ul, body dir, body menu { + margin: 0 0 0 1em; line-height: 1.2; } -HTML { - margin: 0; +html { + margin: 0; padding: 0; } -BODY P B.APPLICATION { - color: #000000; +.filename { + color: #007a00; } -.FILENAME { +.package, .port { + color: #007a00; + font-family: monospace; + font-style: italic; +} + +.svnref { color: #007a00; } -.GUIMENU, .GUIMENUITEM, .GUISUBMENU, -.GUILABEL, .INTERFACE, -.SHORTCUT, .SHORTCUT .KEYCAP { +.guimenu, .guimenuitem, .guisubmenu, +.guilabel, .interface, +.shortcut, .shortcut .keycap { font-weight: bold; } -.GUIBUTTON { +.guibutton { background-color: #CFCFCF; padding: 2px; } -.ACCEL { +.accel { background-color: #F0F0F0; text-decoration: underline; -} +} -.SCREEN { +pre.screen { + white-space: pre; + overflow: auto; + font-family: monospace; padding: 1ex; + background-color: #edc; + border: 1px solid #ccc; + border-radius: 4px; } -.PROGRAMLISTING { +pre.programlisting { + white-space: pre; + overflow: auto; + font-family: monospace; padding: 1ex; background-color: #eee; border: 1px solid #ccc; + border-radius: 4px; } @media screen { /* hide from IE3 */ a[href]:hover { background: #ffa } } -BLOCKQUOTE.NOTE { +.informaltable, .table th { + padding-left: 0.2em; + text-align: left; +} + +.note, .tip, .important, .warning, .caution, .example, div.procedure { + border-radius: 4px; + padding: 2ex 2ex 0 2ex; + margin: .75em 3em .75em 1em; + line-height: 1.3; +} + +.note, div.procedure { color: #222; background: #eee; border: 1px solid #ccc; - padding: 0.4em 0.4em; - width: 85%; + width: 90%; } -BLOCKQUOTE.TIP { +.tip { color: #004F00; background: #d8ecd6; border: 1px solid green; - padding: 0.2em 2em; - width: 85%; + width: 90%; } -BLOCKQUOTE.IMPORTANT { +.important { font-style:italic; border: 1px solid #a00; border-left: 12px solid #c00; - padding: 0.1em 1em; + width: 90%; } -BLOCKQUOTE.WARNING { +.warning { color: #9F1313; background: #f8e8e8; border: 1px solid #e59595; - padding: 0.2em 2em; - width: 85%; + width: 90%; +} + +.caution { + color: #3E3535; + background: #FFC; + border: 1px solid #e59595; + width: 90%; } -.EXAMPLE { +.example { background: #fefde6; border: 1px solid #f1bb16; - margin: 1em 0; - padding: 0.2em 2em; width: 90%; } -.INFORMALTABLE TABLE.CALSTABLE TR TD { +.admontitle { + display: inline; + line-height: 1; + margin-right: 0; +} + +.procedure-title { + font-weight: bold; + line-height: 1; + margin-right: 0; +} + +.note p, .tip p, .important p, .warning p, .caution p, { + display: inline; +} + +.informaltable table.calstable tr td { padding-left: 1em; padding-right: 1em; } +.authorgroup { + font-style: italic; +} + +.userinput, +.userinput code { + font-weight: bold; +} + +pre.screen strong { + font-weight: normal; +} + +.procedure ol { + line-height: 1.2; + margin: 0 0 0 -1em; +} + span.contrib { font-size: small; font-style: italic; Modified: head/en_US.ISO8859-1/htdocs/releases/8.4R/docbook.css ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/8.4R/docbook.css Thu Feb 5 16:33:38 2015 (r46252) +++ head/en_US.ISO8859-1/htdocs/releases/8.4R/docbook.css Thu Feb 5 16:55:02 2015 (r46253) @@ -26,217 +26,378 @@ * $FreeBSD$ */ -BODY ADDRESS { - line-height: 1.3; - margin: .6em 0; +/* + * General DocBook styles from the DocBook XSL distribution + */ + +.formalpara-title { + font-weight: bold; +} + +a:link { + color:#0645AD; + text-decoration: underline; +} + +a:visited, a:hover, a:active { + color:#663366; + text-decoration: underline; +} + +div.blockquote-title { + font-weight: bold; + margin-top: 1em; + margin-bottom: 1em; } -BODY BLOCKQUOTE { - margin-top: .75em; +span.msgmain-title { + font-weight: bold; +} + +span.msgsub-title { + font-weight: bold; +} + +span.msgrel-title { + font-weight: bold; +} + +div.msglevel, div.msgorig, div.msgaud { + margin-top: 1em; + margin-bottom: 1em; +} + +span.msglevel-title, span.msgorig-title, span.msgaud-title { + font-weight: bold; +} + +div.msgexplan { + margin-top: 1em; + margin-bottom: 1em; +} + +span.msgexplan-title { + font-weight: bold; +} + +div.figure-title { + font-weight: bold; +} + +div.example-title { + font-weight: bold; +} + +div.equation-title { + font-weight: bold; +} + +div.table-title { + font-weight: bold; +} + +div.sidebar-title { + font-weight: bold; +} + +div.synopsis { + white-space: pre; + font-family: monospace; +} + +/* + * FreeBSD-specific formatting + */ + +body address { line-height: 1.3; - margin-bottom: .75em; + margin: .6em 0; } -HTML BODY { +html body { margin: 1em 8% 1em 10%; line-height: 1.2; } -.LEGALNOTICE { +@media screen { + html body { font-family: sans-serif; } +} + +@media print { + html body { font-family: serif; } +} + +.legalnotice { font-size: small; font-variant: small-caps; } *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** From owner-svn-doc-head@FreeBSD.ORG Thu Feb 5 16:56:09 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from hub.FreeBSD.org (hub.freebsd.org [IPv6:2001:1900:2254:206c::16:88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 697C061D; Thu, 5 Feb 2015 16:56:08 +0000 (UTC) Date: Thu, 5 Feb 2015 16:56:02 +0000 From: Glen Barber To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: Re: svn commit: r46253 - in head/en_US.ISO8859-1/htdocs/releases: 10.0R 10.1R 8.4R 9.3R Message-ID: <20150205165602.GB1300@hub.FreeBSD.org> References: <201502051655.t15Gt3Du024128@svn.freebsd.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="uZ3hkaAS1mZxFaxD" Content-Disposition: inline In-Reply-To: <201502051655.t15Gt3Du024128@svn.freebsd.org> X-Operating-System: FreeBSD 11.0-CURRENT amd64 X-SCUD-Definition: Sudden Completely Unexpected Dataloss X-SULE-Definition: Sudden Unexpected Learning Event User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Feb 2015 16:56:09 -0000 --uZ3hkaAS1mZxFaxD Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Feb 05, 2015 at 04:55:03PM +0000, Glen Barber wrote: > Author: gjb > Date: Thu Feb 5 16:55:02 2015 > New Revision: 46253 > URL: https://svnweb.freebsd.org/changeset/doc/46253 >=20 > Log: > Synchronize the docbook.css stylesheet with what exists > in the doc/ tree, which fixes a number of rendering nits. > =20 s:doc/:src/: Glen --uZ3hkaAS1mZxFaxD Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJU06CdAAoJEAMUWKVHj+KThLAP/RYT+5biCPBUg45FRca3zweg QylFbIsYePnv+yizBFG8krgT4MoSaijCd5IdXPmmVQ7LyLL91leFseiFRB93H/Jp I/x6fFGX4Wupt0Y6j90CacAvd77IhZRxJVfWVvlcN9kE2GPlzSn+qwQP6hZAJsFi LKG78tI5HMMzwoLJNOTc1I//QK5FrbLqzXSt+7meI/rl7tfaSPC2dRKS/7OLiV1s 6EhiTukOi6uusuF3xu1ipcE2ClK8zu3h6IFZgWZYWoRjIHNT/yg5+yWaZa9ja3CP HBZZPuUbKgphfjYtWUWZ9ObjjtalaJt4pXAQcZM1zduVgEjqarXNms/fVoqpo3Fr Nes7Mpv5Uh05oRAFT88OkcLFGtxNltuhiyZEYL8JZ/8sKxGKLTvBgadN9LhBCBZ1 La/4F81laYBHeX6bD4z1wgAXKaHjDH4TFwppRddc2mUagj33zHuWuYj5nfQ6ZjZX ruYgIW9NdtnRrbUUdYGoIH2R5T7ktwaoy5hq5+hOu+Em3mTXq8gyUwFqnEH8v5/X UJ7ueNUKZ9GFB+6WZuo9bY/un+YayDEQt8VSylOJe6660EV96fA5VpcORZrheUee 9ClxDdvPrv5IpxusS7ItSx93lzb4ZzYTB1LV7/y0iKO/GHGG8QQ2XtiPiULSfVNb TefyMtsweWhGPD2OnnrH =JaM5 -----END PGP SIGNATURE----- --uZ3hkaAS1mZxFaxD-- From owner-svn-doc-head@FreeBSD.ORG Thu Feb 5 17:08:30 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id A6978B34; Thu, 5 Feb 2015 17:08:30 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8E5E3A49; Thu, 5 Feb 2015 17:08:30 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t15H8UvY030195; Thu, 5 Feb 2015 17:08:30 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t15H8U13030194; Thu, 5 Feb 2015 17:08:30 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201502051708.t15H8U13030194@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Thu, 5 Feb 2015 17:08:30 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46254 - head/en_US.ISO8859-1/htdocs/releases/8.4R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Feb 2015 17:08:30 -0000 Author: gjb Date: Thu Feb 5 17:08:29 2015 New Revision: 46254 URL: https://svnweb.freebsd.org/changeset/doc/46254 Log: Belatedly regen after r257822 Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html Thu Feb 5 16:55:02 2015 (r46253) +++ head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html Thu Feb 5 17:08:29 2015 (r46254) @@ -1,11 +1,11 @@ - -FreeBSD 8.4-RELEASE Errata

FreeBSD 8.4-RELEASE Errata

+ +FreeBSD 8.4-RELEASE Errata

FreeBSD 8.4-RELEASE Errata

The FreeBSD Project -

FreeBSD is a registered trademark of - the FreeBSD Foundation.

Intel, Celeron, EtherExpress, i386, +

FreeBSD is a registered trademark of + the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United - States and other countries.

SPARC, SPARC64, SPARCengine, and + States and other countries.

SPARC, SPARC64, and UltraSPARC are trademarks of SPARC International, Inc in the United States and other countries. SPARC International, Inc owns all of the SPARC trademarks and under licensing agreements allows the proper use @@ -13,37 +13,38 @@ manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the - designations have been followed by the or the - symbol.

Last modified on 2013-06-13 by hrs.

Abstract

This document lists errata items for FreeBSD 8.4-RELEASE, - containing significant information discovered after the release - or too late in the release cycle to be otherwise included in the - release documentation. - This information includes security advisories, as well as news - relating to the software or documentation that could affect its - operation or usability. An up-to-date version of this document - should always be consulted before installing this version of - FreeBSD.

This errata document for FreeBSD 8.4-RELEASE - will be maintained until the release of FreeBSD 8.5-RELEASE.

1.Introduction

This errata document contains late-breaking news + designations have been followed by the or the + symbol.

Last modified on 2013-11-07 by delphij.
Abstract

This document lists errata items for FreeBSD 8.4-RELEASE, + containing significant information discovered after the release + or too late in the release cycle to be otherwise included in the + release documentation. + This information includes security advisories, as well as news + relating to the software or documentation that could affect its + operation or usability. An up-to-date version of this document + should always be consulted before installing this version of + FreeBSD.

This errata document for FreeBSD 8.4-RELEASE + will be maintained until the FreeBSD 8.4-RELEASE end of life.


1.Introduction

This errata document contains late-breaking news about FreeBSD 8.4-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems that may already have been found and fixed.

Any version of this errata document actually distributed with the release (for example, on a CDROM distribution) will be out of date by definition, but other copies are kept updated on - the Internet and should be consulted as the current - errata for this release. These other copies of the - errata are located at http://www.FreeBSD.org/releases/, plus any sites + the Internet and should be consulted as the current + errata for this release. These other copies of the + errata are located at http://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.

Source and binary snapshots of FreeBSD 8.4-STABLE also contain up-to-date copies of this document (as of the time of - the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2.Security Advisories

The following security advisories pertain to FreeBSD 8.4-RELEASE. - For more information, consult the individual advisories available from - http://security.FreeBSD.org/.

AdvisoryDateTopic
SA-12:01.openssl03May2012

OpenSSL multiple vulnerabilities

SA-12:02.crypt30May2012

Incorrect crypt() hashing

SA-12:03.bind12June2012

Incorrect handling of zero-length RDATA fields in named(8)

SA-12:04.sysret12June2012

Privilege escalation when returning from kernel

SA-12:05.bind06August2012

named(8) DNSSEC validation Denial of Service

SA-12:06.bind22November2012

Multiple Denial of Service vulnerabilities with named(8)

SA-12:07.hostapd22November2012

Insufficient message length validation for EAP-TLS messages

SA-12:08.li nux22November2012Linux compatibility layer input validation error

SA-13:02.libc19February2013

glob(3) related resource exhaustion

SA-13:03.openssl02April2013

OpenSSL multiple vulnerabilities

SA-13:04.bind02April2013

BIND remote denial of service

SA-13:05.nfsserver29April2013

Insufficient input validation in the NFS server

3.Open Issues

[20130613] The vtnet(4) network interface driver + the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2.Security Advisories

Problems described in the following security advisories have + been fixed in 8.4-RELEASE. For more information, consult + the individual advisories available from + http://security.FreeBSD.org/.

AdvisoryDateTopic
SA-12:01.openssl03May2012

OpenSSL multiple vulnerabilities

SA-12:02.crypt30May2012

Incorrect crypt() hashing

SA-12:03.bind12June2012

Incorrect handling of zero-length RDATA fields in named(8)

SA-12:04.sysret12June2012

Privilege escalation when returning from kernel

SA-12:05.bind6August2012

named(8) DNSSEC validation Denial of Service

SA-12:06.bind22November2012

Multiple Denial of Service vulnerabilities with named(8)

SA-12:07.hostapd22November2012

Insufficient message length validation for EAP-TLS messages

SA-12:08.linux22November2012

Linux compatibility layer input validation error

SA-13:02.libc19February2013

glob(3) related resource exhaustion

SA-13:03.openssl02April2013

OpenSSL multiple vulnerabiliti es

SA-13:04.bind02April2013

BIND remote denial of service

SA-13:05.nfsserver29April2013

Insufficient input validation in the NFS server

3.Open Issues

[20130613] The vtnet(4) network interface driver displays the following message upon configuration when using QEMU 1.4.1 and later:

vtnet0: error setting host MAC filter table

This message is harmless when the interface has only one MAC - address. The patch for this issue is filed to a PR kern/178955.

[20130609] There is incompatibility in jail(8) - configuration because the jail(8) utility and + address. The patch for this issue is filed to a PR kern/178955.

[20130609] There is incompatibility in jail(8) + configuration because the jail(8) utility and rc.d/jail script has been changed. More - specifically, the following sysctl(8) variables cannot be + specifically, the following sysctl(8) variables cannot be used to set the default parameters for jails:

security.jail.mount_zfs_allowed
 security.jail.mount_procfs_allowed
 security.jail.mount_nullfs_allowed
@@ -53,16 +54,16 @@ security.jail.chflags_allowed
 security.jail.allow_raw_sockets
 security.jail.sysvipc_allowed
 security.jail.socket_unixiproute_only
-security.jail.set_hostname_allowed

These could be set by manually using sysctl(8) utility, - the sysctl.conf(5) file, or for some of them the following - variables in rc.conf(5):

jail_set_hostname_allow="yes"
+security.jail.set_hostname_allowed

These could be set by manually using sysctl(8) utility, + the sysctl.conf(5) file, or for some of them the following + variables in rc.conf(5):

jail_set_hostname_allow="yes"
 jail_socket_unixiproute_only="yes"
 jail_sysvipc_allow="yes"

These parameters must now be specified in jail_parameters (or jail_jailname_parameters - for per-jail configuration) in rc.conf(5). For + for per-jail configuration) in rc.conf(5). For example:

jail_parameters="allow.sysvipc allow.raw_sockets"

The valid keywords are the following. For more detail, see - jail(8) manual page.

allow.set_hostname
+      jail(8) manual page.

allow.set_hostname
 allow.sysvipc
 allow.raw_sockets
 allow.chflags
@@ -84,26 +85,26 @@ allow.socket_af

[20130608] FreeB RELENG_8_4_0_RELEASE corresponds to svn://svn.FreeBSD.org/base/release/8.4.0. Please note that FreeBSD source tree for 8.4-RELEASE and its security - branch cannot be updated by using official CVSup servers.

[20130607] (removed about a bge(4) network interface - driver issue because it was incorrect)

[20130606] The fxp(4) network interface driver may not - work well with the dhclient(8) utility. More specifically, + branch cannot be updated by using official CVSup servers.

[20130607] (removed about a bge(4) network interface + driver issue because it was incorrect)

[20130606] The fxp(4) network interface driver may not + work well with the dhclient(8) utility. More specifically, if the /etc/rc.conf has the following line:

ifconfig_fxp0="DHCP"

to activate a DHCP client to configure the network interface, the following notification messages are displayed and - the dhclient(8) utility keeps trying to initialize the + the dhclient(8) utility keeps trying to initialize the network interface forever.

kernel: fxp0: link state changed to UP
 kernel: fxp0: link state changed to DOWN

A patch to fix this issue will be released as an Errata - Notice.

4.Late-Breaking News and Corrections

[20130606] As described in FreeBSD 8.4-RELEASE Release Notes, + Notice.

4.Late-Breaking News and Corrections

[20130606] As described in FreeBSD 8.4-RELEASE Release Notes, FreeBSD ZFS subsystem has been updated to support feature flags for ZFS pools. However, the default version number of a newly created ZFS pool is still 28.

This is because FreeBSD 9.0 and 9.1 do not support the feature flags. This means ZFS pools with feature flag support cannot be used on FreeBSD 9.0 and 9.1. An 8.X system with v28 ZFS pools can - be upgraded to 9.X with no problem. Note that zfs(8) + be upgraded to 9.X with no problem. Note that zfs(8) send and receive commands do not work between pools with different versions. Once a ZFS pool is upgraded from v28, there is no way to upgrade the system to FreeBSD 9.0 and 9.1. FreeBSD 9.2 and later will support ZFS pools with feature flags.

To create a ZFS pool with feature flag support, use the - zpool(8) create command and then the - zpool(8) upgrade command.

\ No newline at end of file + zpool(8) create command and then the + zpool(8) upgrade command.

\ No newline at end of file From owner-svn-doc-head@FreeBSD.ORG Thu Feb 5 17:47:31 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id AFF489B1; Thu, 5 Feb 2015 17:47:31 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 977A0EC7; Thu, 5 Feb 2015 17:47:31 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t15HlVta049535; Thu, 5 Feb 2015 17:47:31 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t15HlVl1049534; Thu, 5 Feb 2015 17:47:31 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201502051747.t15HlVl1049534@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Thu, 5 Feb 2015 17:47:31 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46255 - head/en_US.ISO8859-1/htdocs/releases/9.3R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Feb 2015 17:47:31 -0000 Author: gjb Date: Thu Feb 5 17:47:30 2015 New Revision: 46255 URL: https://svnweb.freebsd.org/changeset/doc/46255 Log: Regen after r278271 Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Thu Feb 5 17:08:29 2015 (r46254) +++ head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Thu Feb 5 17:47:30 2015 (r46255) @@ -1,7 +1,7 @@ -FreeBSD 9.3-RELEASE Errata

FreeBSD 9.3-RELEASE Errata

+FreeBSD 9.3-RELEASE Errata

FreeBSD 9.3-RELEASE Errata

The FreeBSD Project -

FreeBSD is a registered trademark of +

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United @@ -14,7 +14,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - symbol.

Last modified on 2014-11-06 by gjb.
Abstract

This document lists errata items for FreeBSD 9.3-RELEASE, + symbol.

Last modified on 2015-02-05 by gjb.
Abstract

This document lists errata items for FreeBSD 9.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. @@ -23,7 +23,7 @@ operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.

This errata document for FreeBSD 9.3-RELEASE - will be maintained until the EoL of FreeBSD 9.3-STABLE.


1.Introduction

This errata document contains late-breaking news + will be maintained until the EoL of FreeBSD 9.3-STABLE.


1.Introduction

This errata document contains late-breaking news about FreeBSD 9.3-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems @@ -38,11 +38,18 @@ the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2.Security Advisories

Problems described in the following security advisories have been fixed in 9.3-RELEASE. For more information, consult the individual advisories available from - http://security.FreeBSD.org/.

AdvisoryDateTopic
SA-14:18.openssl9September2014

Multiple vulnerabilities

SA-14:19.tcp16September2014

Denial of Service in TCP packet - processing.

SA-14:20.rtsold21October2014

Remote buffer overflow - vulnerability.

SA-14:21.routed21October2014

Remote denial of service - vulnerability.

SA-14:22.namei21October2014

Memory leak in sandboxed namei - lookup.

SA-14:23.openssl21October2014

Multiple vulerabilities.

SA-14:25.setlogin04November2014

Kernel stack disclosure.

SA-14:26.ftp04November2014

Remote code execution.

3.Late-Br eaking News

No late-breaking news.

This file, and other release-related documents, + http://security.FreeBSD.org/.

AdvisoryDateTopic
SA-14:18.openssl9September2014

Multiple vulnerabilities

SA-14:19.tcp16September2014

Denial of Service in TCP packet + processing.

SA-14:20.rtsold21October2014

Remote buffer overflow + vulnerability.

SA-14:21.routed21October2014

Remote denial of service + vulnerability.

SA-14:22.namei21October2014

Memory leak in sandboxed namei + lookup.

SA-14:23.openssl21October2014

Multiple vulerabilities.

SA-14:25.setlogin04November2014

Kernel stack disclosure.

SA-14:26.ftp04November2014

Remote code execution.

SA-14:28.file10December2014

Multiple vulnerabilities in file(1) and + libmagic(3)

SA-14:29.bind10December2014

Remote denial of service + vulnerability

SA-14:31.ntp23December2014

Multiple vulnerabilities

SA-15:01.openssl14January2015

Multiple vulnerabilities

FreeBSD-SA-15:02.kmem27January2015

SCTP kernel memory corruption and + disclosure vulnerability

FreeBSD-SA-15:03.sctp27January2015

SCTP stream reset + vulnerability

3.Errata Notices

ErrataDateTopic
FreeBSD-EN-14:10.tzdata21October2014

Time zone data file update

FreeBSD-EN-14:11.crypt21October2014

Change crypt(3) default hashing algorithm + back to DES

FreeBSD-EN-14:12.zfs11November2014

Fix NFSv4 and ZFS cache consistency + issue

FreeBSD-EN-14:13.freebsd-update23December2014

Fixed directory deletion issue in + freebsd-update(8)

4.Late-Breaking News

No late-breaking news.

This file, and other release-related documents, can be downloaded from http://www.FreeBSD.org/releases/.

For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

All users of FreeBSD 9.3-STABLE should From owner-svn-doc-head@FreeBSD.ORG Thu Feb 5 19:11:22 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 8CD09657; Thu, 5 Feb 2015 19:11:22 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 7418BBAE; Thu, 5 Feb 2015 19:11:22 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t15JBMQw092760; Thu, 5 Feb 2015 19:11:22 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t15JBMl0092759; Thu, 5 Feb 2015 19:11:22 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201502051911.t15JBMl0092759@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Thu, 5 Feb 2015 19:11:22 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46256 - head/en_US.ISO8859-1/htdocs/releases/8.4R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Feb 2015 19:11:22 -0000 Author: gjb Date: Thu Feb 5 19:11:21 2015 New Revision: 46256 URL: https://svnweb.freebsd.org/changeset/doc/46256 Log: Regen after r278272 Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html Thu Feb 5 17:47:30 2015 (r46255) +++ head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html Thu Feb 5 19:11:21 2015 (r46256) @@ -1,7 +1,7 @@ -FreeBSD 8.4-RELEASE Errata

FreeBSD 8.4-RELEASE Errata

+FreeBSD 8.4-RELEASE Errata

FreeBSD 8.4-RELEASE Errata

The FreeBSD Project -

FreeBSD is a registered trademark of +

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United @@ -14,7 +14,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - symbol.

Last modified on 2013-11-07 by delphij.
Abstract

This document lists errata items for FreeBSD 8.4-RELEASE, + symbol.

Last modified on 2015-02-05 by gjb.
Abstract

This document lists errata items for FreeBSD 8.4-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. @@ -23,7 +23,7 @@ operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD.

This errata document for FreeBSD 8.4-RELEASE - will be maintained until the FreeBSD 8.4-RELEASE end of life.


1.Introduction

This errata document contains late-breaking news + will be maintained until the FreeBSD 8.4-RELEASE end of life.


1.Introduction

This errata document contains late-breaking news about FreeBSD 8.4-RELEASE Before installing this version, it is important to consult this document to learn about any post-release discoveries or problems @@ -38,7 +38,48 @@ the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2.Security Advisories

Problems described in the following security advisories have been fixed in 8.4-RELEASE. For more information, consult the individual advisories available from - http://security.FreeBSD.org/.

AdvisoryDateTopic
SA-12:01.openssl03May2012

OpenSSL multiple vulnerabilities

SA-12:02.crypt30May2012

Incorrect crypt() hashing

SA-12:03.bind12June2012

Incorrect handling of zero-length RDATA fields in named(8)

SA-12:04.sysret12June2012

Privilege escalation when returning from kernel

SA-12:05.bind6August2012

named(8) DNSSEC validation Denial of Service

SA-12:06.bind22November2012

Multiple Denial of Service vulnerabilities with named(8)

SA-12:07.hostapd22November2012

Insufficient message length validation for EAP-TLS messages

SA-12:08.linux22November2012

Linux compatibility layer input validation error

SA-13:02.libc19February2013

glob(3) related resource exhaustion

SA-13:03.openssl02April2013

OpenSSL multiple vulnerabiliti es

SA-13:04.bind02April2013

BIND remote denial of service

SA-13:05.nfsserver29April2013

Insufficient input validation in the NFS server

3.Open Issues

[20130613] The vtnet(4) network interface driver + http://security.FreeBSD.org/.

AdvisoryDateTopic
FreeBSD-SA-13:07.bind26July2013

Denial of Service vulnerability in + named(8)

FreeBSD-SA-13:09.ip_multicast21August2013

Integer overflow in computing the size of + a temporary buffer can result in a buffer which is too + small for the requested operation

FreeBSD-SA-13:10.sctp21August2013

Fix a bug that could lead to kernel memory + disclosure with SCTP state cookie

FreeBSD-SA-13:12.ifioctl10September2013

In IPv6 and NetATM, stop + SIOCSIFADDR, + SIOCSIFBRDADDR, + SIOCSIFDSTADDR and + SIOCSIFNETMASK at the socket layer + rather than pass them on to the link layer without + validation or credential checks

FreeBSD-SA-13:13.nullfs10September2013

Prevent cross-mount hardlinks between different + nullfs mounts of the same underlying + filesystem

FreeBSD-SA-14:01.bsnmpd14January2014

bsnmpd remote denial of service + vulnerability

FreeBSD-SA-14:02.ntpd14January2014

ntpd distributed reflection Denial of Service + vulnerability

FreeBSD-SA-14:04.bind14January2014

BIND remote denial of service + vulnerability

FreeBSD-SA-14:05.nfsserver8April2014

NFS deadlock vulnerability

FreeBSD-SA-14:06.openssl8April2014

ECDSA Cache Side-channel Attack in + OpenSSL

FreeBSD-SA-14:08.tcp30April2014

TCP reassembly vulnerability

FreeBSD-SA-14:11.sendmail5June2014

sendmail improper close-on-exec flag + handling

FreeBSD-SA-14:12.ktrace5June2014

ktrace memory disclosure

FreeBSD-SA-14:14.openssl5June2014

OpenSSL multiple vulnerabilities

FreeBSD-SA-14:16.file5June2014

Multiple vulnerabilities in file(1) and + libmagic(3)

FreeBSD-SA-14:17.kmem8July2014

kernel memory disclosure in control message and + SCTP notifications

FreeBSD-SA-14:18.openssl9September2014

Multiple vulnerabilities in + OpenSSL

FreeBSD-SA-14:19.tcp16September2014

Denial of Service in TCP packet + processing

FreeBSD-SA-14:21.routed21October2014

routed(8) denial of service + vulnerability

FreeBSD-SA-14:23.openssl21October2014

Multiple vulnerabilities in + OpenSSL

FreeBSD-SA-14:25.setlogin4November2014

kernel stack disclosure in setlogin(2) and + getlogin(2)

FreeBSD-SA-14:26.ftp4November2014

Remote command execution in + ftp(1)

FreeBSD-SA-14:28.file10December2014

Multiple vulnerabilities in file(1) and + libmagic(3)

FreeBSD-SA-14:29.bind10December2014

BIND remote denial of service + vulnerability

FreeBSD-SA-14:31.ntp23December2014

Multiple vulnerabilities in NTP + suite

FreeBSD-SA-15:01.ntp14January2015

Multiple vulnerabilities in + OpenSSL

FreeBSD-SA-15:02.kmem27January2015

Fix SCTP SCTP_SS_VALUE kernel memory corruption + and disclosure vulnerability

FreeBSD-SA-15:03.sctp27January2015

Fix SCTP stream reset + vulnerability

3.Errata Notices

ErrataDateTopic
FreeBSD-EN-13:01.fxp28June2013

Fixed a problem where dhclient(8) would + infinitely try to intialize fxp(4)

FreeBSD-EN-13:02.vtnet28June2013

Fixed a problem frames sent to additional MAC + addresses are not forwarded to the vtnet(4) + interface

FreeBSD-EN-13:04.freebsd-update26October2013

Multiple fixes

FreeBSD-EN-13:05.freebsd-update28November2013

Fix INDEX generation

FreeBSD-EN-14:01.random14January2014

Disable hardware RNGs by default

FreeBSD-EN-14:02.mmap14January2014

Fix incorrect coalescing of stack + entry

FreeBSD-EN-14:03.pkg15May2014

Add pkg bootstrapping, configuration and public + keys

FreeBSD-EN-14:04.kldxref15May2014

Improve build repeatability for + kldxref(8)

FreeBSD-EN-14:06.exec3June2014

Fix triple-fault when executing from a threaded + process

FreeBSD-EN-14:08.heimdal24June2014

Fix gss_pseudo_random() + interoperability issue

FreeBSD-EN-14:09.jail8July2014

Fix jail fails to start if + WITHOUT_INET/WITHOUT_INET6 is use

FreeBSD-EN-14:10.tzdata21October2014

Time zone data file update

FreeBSD-EN-14:12.zfs4November2014

Fix NFSv4 and ZFS cache consistency + issue

FreeBSD-EN-14:13.freebsd-update23December2014

Fix directory deletion issue

4.Open Issues

[20130613] The vtnet(4) network interface driver displays the following message upon configuration when using QEMU 1.4.1 and later:

vtnet0: error setting host MAC filter table

This message is harmless when the interface has only one MAC address. The patch for this issue is filed to a PR kern/178955.

[20130609] There is incompatibility in jail(8) @@ -94,7 +135,7 @@ allow.socket_af

[20130608] FreeB the dhclient(8) utility keeps trying to initialize the network interface forever.

kernel: fxp0: link state changed to UP
 kernel: fxp0: link state changed to DOWN

A patch to fix this issue will be released as an Errata - Notice.

4.Late-Breaking News and Corrections

[20130606] As described in FreeBSD 8.4-RELEASE Release Notes, + Notice.

5.Late-Breaking News and Corrections

[20130606] As described in FreeBSD 8.4-RELEASE Release Notes, FreeBSD ZFS subsystem has been updated to support feature flags for ZFS pools. However, the default version number of a newly created ZFS pool is still 28.

This is because FreeBSD 9.0 and 9.1 do not support the feature From owner-svn-doc-head@FreeBSD.ORG Thu Feb 5 19:15:41 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 0B71392F; Thu, 5 Feb 2015 19:15:41 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E5BDBBD9; Thu, 5 Feb 2015 19:15:40 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t15JFewZ093881; Thu, 5 Feb 2015 19:15:40 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t15JFeqS093880; Thu, 5 Feb 2015 19:15:40 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201502051915.t15JFeqS093880@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Thu, 5 Feb 2015 19:15:40 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46257 - head/en_US.ISO8859-1/htdocs/releases/9.3R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Feb 2015 19:15:41 -0000 Author: gjb Date: Thu Feb 5 19:15:40 2015 New Revision: 46257 URL: https://svnweb.freebsd.org/changeset/doc/46257 Log: Regen after r278273 Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Thu Feb 5 19:11:21 2015 (r46256) +++ head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Thu Feb 5 19:15:40 2015 (r46257) @@ -1,5 +1,5 @@ -FreeBSD 9.3-RELEASE Errata

FreeBSD 9.3-RELEASE Errata

+FreeBSD 9.3-RELEASE Errata

FreeBSD 9.3-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, @@ -38,13 +38,13 @@ the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2.Security Advisories

Problems described in the following security advisories have been fixed in 9.3-RELEASE. For more information, consult the individual advisories available from - http://security.FreeBSD.org/.

AdvisoryDateTopic
SA-14:18.openssl9September2014

Multiple vulnerabilities

SA-14:19.tcp16September2014

Denial of Service in TCP packet - processing.

SA-14:20.rtsold21October2014

Remote buffer overflow - vulnerability.

SA-14:21.routed21October2014

Remote denial of service - vulnerability.

SA-14:22.namei21October2014

Memory leak in sandboxed namei - lookup.

SA-14:23.openssl21October2014

Multiple vulerabilities.

SA-14:25.setlogin04November2014

Kernel stack disclosure.

SA-14:26.ftp04November2014

Remote code execution.

SA-14:28.file10December2014

Multiple vulnerabilities in file(1) and - libmagic(3)

SA-14:29.bind10December2014

Remote denial of service - vulnerability

SA-14:31.ntp23December2014

Multiple vulnerabilities

SA-15:01.openssl14January2015

Multiple vulnerabilities

FreeBSD-SA-15:02.kmem27January2015

SCTP kernel memory corruption and + http://security.FreeBSD.org/.

AdvisoryDateTopic
FreeBSD-SA-14:18.openssl9September2014

Multiple vulnerabilities

FreeBSD-SA-14:19.tcp16September2014

Denial of Service in TCP packet + processing.

FreeBSD-SA-14:20.rtsold21October2014

Remote buffer overflow + vulnerability.

FreeBSD-SA-14:21.routed21October2014

Remote denial of service + vulnerability.

FreeBSD-SA-14:22.namei21October2014

Memory leak in sandboxed namei + lookup.

FreeBSD-SA-14:23.openssl21October2014

Multiple vulerabilities.

FreeBSD-SA-14:25.setlogin04November2014

Kernel stack disclosure.

FreeBSD-SA-14:26.ftp04November2014

Remote code execution.

FreeBSD-SA-14:28.file10December2014

Multiple vulnerabilities in file(1) and + libmagic(3)

FreeBSD-SA-14:29.bind10December2014

Remote denial of service + vulnerability

FreeBSD-SA-14:31.ntp23December2014

Multiple vulnerabilities

FreeBSD-SA-15:01.openssl14January2015

Multiple vulnerabilities

FreeBSD-SA-15:02.kmem27January2015

SCTP kernel memory corruption and disclosure vulnerability

FreeBSD-SA-15:03.sctp27January2015

SCTP stream reset vulnerability

3.Errata Notices

ErrataDateTopic
FreeBSD-EN-14:10.tzdata21October2014

Time zone data file update

FreeBSD-EN-14:11.crypt21October2014

Change crypt(3) default hashing algorithm back to DES

FreeBSD-EN-14:12.zfs11November2014

Fix NFSv4 and ZFS cache consistency From owner-svn-doc-head@FreeBSD.ORG Thu Feb 5 19:34:03 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 281135E2; Thu, 5 Feb 2015 19:34:03 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 0E75ADF3; Thu, 5 Feb 2015 19:34:03 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t15JY3NG003516; Thu, 5 Feb 2015 19:34:03 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t15JY2lO003511; Thu, 5 Feb 2015 19:34:02 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201502051934.t15JY2lO003511@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Thu, 5 Feb 2015 19:34:02 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46258 - in head/en_US.ISO8859-1/htdocs/releases: 8.4R 9.3R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Feb 2015 19:34:03 -0000 Author: gjb Date: Thu Feb 5 19:34:02 2015 New Revision: 46258 URL: https://svnweb.freebsd.org/changeset/doc/46258 Log: Regen after r278275 Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html Thu Feb 5 19:15:40 2015 (r46257) +++ head/en_US.ISO8859-1/htdocs/releases/8.4R/errata.html Thu Feb 5 19:34:02 2015 (r46258) @@ -1,5 +1,5 @@ -FreeBSD 8.4-RELEASE Errata

FreeBSD 8.4-RELEASE Errata

+FreeBSD 8.4-RELEASE Errata

FreeBSD 8.4-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, @@ -38,48 +38,48 @@ the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2.Security Advisories

Problems described in the following security advisories have been fixed in 8.4-RELEASE. For more information, consult the individual advisories available from - http://security.FreeBSD.org/.

AdvisoryDateTopic
FreeBSD-SA-13:07.bind26July2013

Denial of Service vulnerability in - named(8)

FreeBSD-SA-13:09.ip_multicast21August2013

Integer overflow in computing the size of + http://security.FreeBSD.org/.

AdvisoryDateTopic
FreeBSD-SA-13:07.bind26July2013

Denial of Service vulnerability in + named(8)

FreeBSD-SA-13:09.ip_multicast21August2013

Integer overflow in computing the size of a temporary buffer can result in a buffer which is too - small for the requested operation

FreeBSD-SA-13:10.sctp21August2013

Fix a bug that could lead to kernel memory - disclosure with SCTP state cookie

FreeBSD-SA-13:12.ifioctl10September2013

In IPv6 and NetATM, stop + small for the requested operation

FreeBSD-SA-13:10.sctp21August2013

Fix a bug that could lead to kernel memory + disclosure with SCTP state cookie

FreeBSD-SA-13:12.ifioctl10September2013

In IPv6 and NetATM, stop SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK at the socket layer rather than pass them on to the link layer without - validation or credential checks

FreeBSD-SA-13:13.nullfs10September2013

Prevent cross-mount hardlinks between different + validation or credential checks

FreeBSD-SA-13:13.nullfs10September2013

Prevent cross-mount hardlinks between different nullfs mounts of the same underlying - filesystem

FreeBSD-SA-14:01.bsnmpd14January2014

bsnmpd remote denial of service - vulnerability

FreeBSD-SA-14:02.ntpd14January2014

ntpd distributed reflection Denial of Service - vulnerability

FreeBSD-SA-14:04.bind14January2014

BIND remote denial of service - vulnerability

FreeBSD-SA-14:05.nfsserver8April2014

NFS deadlock vulnerability

FreeBSD-SA-14:06.openssl8April2014

ECDSA Cache Side-channel Attack in - OpenSSL

FreeBSD-SA-14:08.tcp30April2014

TCP reassembly vulnerability

FreeBSD-SA-14:11.sendmail5June2014

sendmail improper close-on-exec flag - handling

FreeBSD-SA-14:12.ktrace5June2014

ktrace memory disclosure

FreeBSD-SA-14:14.openssl5June2014

OpenSSL multiple vulnerabilities

FreeBSD-SA-14:16.file5June2014

Multiple vulnerabilities in file(1) and - libmagic(3)

FreeBSD-SA-14:17.kmem8July2014

kernel memory disclosure in control message and - SCTP notifications

FreeBSD-SA-14:18.openssl9September2014

Multiple vulnerabilities in - OpenSSL

FreeBSD-SA-14:19.tcp16September2014

Denial of Service in TCP packet - processing

FreeBSD-SA-14:21.routed21October2014

routed(8) denial of service - vulnerability

FreeBSD-SA-14:23.openssl21October2014

Multiple vulnerabilities in - OpenSSL

FreeBSD-SA-14:25.setlogin4November2014

kernel stack disclosure in setlogin(2) and - getlogin(2)

FreeBSD-SA-14:26.ftp4November2014

Remote command execution in - ftp(1)

FreeBSD-SA-14:28.file10December2014

Multiple vulnerabilities in file(1) and - libmagic(3)

FreeBSD-SA-14:29.bind10December2014

BIND remote denial of service - vulnerability

FreeBSD-SA-14:31.ntp23December2014

Multiple vulnerabilities in NTP - suite

FreeBSD-SA-15:01.ntp14January2015

Multiple vulnerabilities in - OpenSSL

FreeBSD-SA-15:02.kmem27January2015

Fix SCTP SCTP_SS_VALUE kernel memory corruption - and disclosure vulnerability

FreeBSD-SA-15:03.sctp27January2015

Fix SCTP stream reset - vulnerability

3.Errata Notices

ErrataDateTopic
FreeBSD-EN-13:01.fxp28June2013

Fixed a problem where dhclient(8) would - infinitely try to intialize fxp(4)

FreeBSD-EN-13:02.vtnet28June2013

Fixed a problem frames sent to additional MAC + filesystem

FreeBSD-SA-14:01.bsnmpd14January2014

bsnmpd remote denial of service + vulnerability

FreeBSD-SA-14:02.ntpd14January2014

ntpd distributed reflection Denial of Service + vulnerability

FreeBSD-SA-14:04.bind14January2014

BIND remote denial of service + vulnerability

FreeBSD-SA-14:05.nfsserver8April2014

NFS deadlock vulnerability

FreeBSD-SA-14:06.openssl8April2014

ECDSA Cache Side-channel Attack in + OpenSSL

FreeBSD-SA-14:08.tcp30April2014

TCP reassembly vulnerability

FreeBSD-SA-14:11.sendmail5June2014

sendmail improper close-on-exec flag + handling

FreeBSD-SA-14:12.ktrace5June2014

ktrace memory disclosure

FreeBSD-SA-14:14.openssl5June2014

OpenSSL multiple vulnerabilities

FreeBSD-SA-14:16.file5June2014

Multiple vulnerabilities in file(1) and + libmagic(3)

FreeBSD-SA-14:17.kmem8July2014

kernel memory disclosure in control message and + SCTP notifications

FreeBSD-SA-14:18.openssl9September2014

Multiple vulnerabilities in + OpenSSL

FreeBSD-SA-14:19.tcp16September2014

Denial of Service in TCP packet + processing

FreeBSD-SA-14:21.routed21October2014

routed(8) denial of service + vulnerability

FreeBSD-SA-14:23.openssl21October2014

Multiple vulnerabilities in + OpenSSL

FreeBSD-SA-14:25.setlogin4November2014

kernel stack disclosure in setlogin(2) and + getlogin(2)

FreeBSD-SA-14:26.ftp4November2014

Remote command execution in + ftp(1)

FreeBSD-SA-14:28.file10December2014

Multiple vulnerabilities in file(1) and + libmagic(3)

FreeBSD-SA-14:29.bind10December2014

BIND remote denial of service + vulnerability

FreeBSD-SA-14:31.ntp23December2014

Multiple vulnerabilities in NTP + suite

FreeBSD-SA-15:01.ntp14January2015

Multiple vulnerabilities in + OpenSSL

FreeBSD-SA-15:02.kmem27January2015

Fix SCTP SCTP_SS_VALUE kernel memory corruption + and disclosure vulnerability

FreeBSD-SA-15:03.sctp27January2015

Fix SCTP stream reset + vulnerability

3.Errata Notices

ErrataDateTopic
FreeBSD-EN-13:01.fxp28June2013

Fixed a problem where dhclient(8) would + infinitely try to intialize fxp(4)

FreeBSD-EN-13:02.vtnet28June2013

Fixed a problem frames sent to additional MAC addresses are not forwarded to the vtnet(4) - interface

FreeBSD-EN-13:04.freebsd-update26October2013

Multiple fixes

FreeBSD-EN-13:05.freebsd-update28November2013

Fix INDEX generation

FreeBSD-EN-14:01.random14January2014

Disable hardware RNGs by default

FreeBSD-EN-14:02.mmap14January2014

Fix incorrect coalescing of stack - entry

FreeBSD-EN-14:03.pkg15May2014

Add pkg bootstrapping, configuration and public - keys

FreeBSD-EN-14:04.kldxref15May2014

Improve build repeatability for - kldxref(8)

FreeBSD-EN-14:06.exec3June2014

Fix triple-fault when executing from a threaded - process

FreeBSD-EN-14:08.heimdal24June2014

Fix gss_pseudo_random() - interoperability issue

FreeBSD-EN-14:09.jail8July2014

Fix jail fails to start if - WITHOUT_INET/WITHOUT_INET6 is use

FreeBSD-EN-14:10.tzdata21October2014

Time zone data file update

FreeBSD-EN-14:12.zfs4November2014

Fix NFSv4 and ZFS cache consistency - issue

FreeBSD-EN-14:13.freebsd-update23December2014

Fix directory deletion issue

4.Open Issues

[20130613] The vtnet(4) network interface driver + interface

FreeBSD-EN-13:04.freebsd-update26October2013

Multiple fixes

FreeBSD-EN-13:05.freebsd-update28November2013

Fix INDEX generation

FreeBSD-EN-14:01.random14January2014

Disable hardware RNGs by default

FreeBSD-EN-14:02.mmap14January2014

Fix incorrect coalescing of stack + entry

FreeBSD-EN-14:03.pkg15May2014

Add pkg bootstrapping, configuration and public + keys

FreeBSD-EN-14:04.kldxref15May2014

Improve build repeatability for + kldxref(8)

FreeBSD-EN-14:06.exec3June2014

Fix triple-fault when executing from a threaded + process

FreeBSD-EN-14:08.heimdal24June2014

Fix gss_pseudo_random() + interoperability issue

FreeBSD-EN-14:09.jail8July2014

Fix jail fails to start if + WITHOUT_INET/WITHOUT_INET6 is use

FreeBSD-EN-14:10.tzdata21October2014

Time zone data file update

FreeBSD-EN-14:12.zfs4November2014

Fix NFSv4 and ZFS cache consistency + issue

FreeBSD-EN-14:13.freebsd-update23December2014

Fix directory deletion issue

4.Open Issues

[20130613] The vtnet(4) network interface driver displays the following message upon configuration when using QEMU 1.4.1 and later:

vtnet0: error setting host MAC filter table

This message is harmless when the interface has only one MAC address. The patch for this issue is filed to a PR kern/178955.

[20130609] There is incompatibility in jail(8) Modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Thu Feb 5 19:15:40 2015 (r46257) +++ head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Thu Feb 5 19:34:02 2015 (r46258) @@ -1,5 +1,5 @@ -FreeBSD 9.3-RELEASE Errata

FreeBSD 9.3-RELEASE Errata

+FreeBSD 9.3-RELEASE Errata

FreeBSD 9.3-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, @@ -38,19 +38,19 @@ the snapshot).

For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

2.Security Advisories

Problems described in the following security advisories have been fixed in 9.3-RELEASE. For more information, consult the individual advisories available from - http://security.FreeBSD.org/.

AdvisoryDateTopic
FreeBSD-SA-14:18.openssl9September2014

Multiple vulnerabilities

FreeBSD-SA-14:19.tcp16September2014

Denial of Service in TCP packet - processing.

FreeBSD-SA-14:20.rtsold21October2014

Remote buffer overflow - vulnerability.

FreeBSD-SA-14:21.routed21October2014

Remote denial of service - vulnerability.

FreeBSD-SA-14:22.namei21October2014

Memory leak in sandboxed namei - lookup.

FreeBSD-SA-14:23.openssl21October2014

Multiple vulerabilities.

FreeBSD-SA-14:25.setlogin04November2014

Kernel stack disclosure.

FreeBSD-SA-14:26.ftp04November2014

Remote code execution.

FreeBSD-SA-14:28.file10December2014

Multiple vulnerabilities in file(1) and - libmagic(3)

FreeBSD-SA-14:29.bind10December2014

Remote denial of service - vulnerability

FreeBSD-SA-14:31.ntp23December2014

Multiple vulnerabilities

FreeBSD-SA-15:01.openssl14January2015

Multiple vulnerabilities

FreeBSD-SA-15:02.kmem27January2015

SCTP kernel memory corruption and - disclosure vulnerability

FreeBSD-SA-15:03.sctp27January2015

SCTP stream reset - vulnerability

3.Errata Notices

ErrataDateTopic
FreeBSD-EN-14:10.tzdata21October2014

Time zone data file update

FreeBSD-EN-14:11.crypt21October2014

Change crypt(3) default hashing algorithm - back to DES

FreeBSD-EN-14:12.zfs11November2014

Fix NFSv4 and ZFS cache consistency - issue

FreeBSD-EN-14:13.freebsd-update23December2014

Fixed directory deletion issue in + http://security.FreeBSD.org/.

AdvisoryDateTopic
FreeBSD-SA-14:18.openssl9September2014

Multiple vulnerabilities

FreeBSD-SA-14:19.tcp16September2014

Denial of Service in TCP packet + processing.

FreeBSD-SA-14:20.rtsold21October2014

Remote buffer overflow + vulnerability.

FreeBSD-SA-14:21.routed21October2014

Remote denial of service + vulnerability.

FreeBSD-SA-14:22.namei21October2014

Memory leak in sandboxed namei + lookup.

FreeBSD-SA-14:23.openssl21October2014

Multiple vulerabilities.

FreeBSD-SA-14:25.setlogin04November2014

Kernel stack disclosure.

FreeBSD-SA-14:26.ftp04November2014

Remote code execution.

FreeBSD-SA-14:28.file10December2014< /td>

Multiple vulnerabilities in file(1) and + libmagic(3)

FreeBSD-SA-14:29.bind10December2014

Remote denial of service + vulnerability

FreeBSD-SA-14:31.ntp23December2014

Multiple vulnerabilities

FreeBSD-SA-15:01.openssl14January2015

Multiple vulnerabilities

FreeBSD-SA-15:02.kmem27January2015

SCTP kernel memory corruption and + disclosure vulnerability

FreeBSD-SA-15:03.sctp27January2015

SCTP stream reset + vulnerability

3.Errata Notices

ErrataDateTopic
FreeBSD-EN-14:10.tzdata21October2014

Time zone data file update

FreeBSD-EN-14:11.crypt21October2014

Change crypt(3) default hashing algorithm + back to DES

FreeBSD-EN-14:12.zfs11November2014

Fix NFSv4 and ZFS cache consistency + issue

FreeBSD-EN-14:13.freebsd-update23December2014

Fixed directory deletion issue in freebsd-update(8)

4.Late-Breaking News

No late-breaking news.

This file, and other release-related documents, - can be downloaded from http://www.FreeBSD.org/releases/.

For questions about FreeBSD, read the + can be downloaded from https://www.FreeBSD.org/releases/.

For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

All users of FreeBSD 9.3-STABLE should subscribe to the <stable@FreeBSD.org> From owner-svn-doc-head@FreeBSD.ORG Thu Feb 5 20:08:58 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id CF3D7771; Thu, 5 Feb 2015 20:08:58 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BBA3126F; Thu, 5 Feb 2015 20:08:58 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t15K8wx2019110; Thu, 5 Feb 2015 20:08:58 GMT (envelope-from uqs@FreeBSD.org) Received: (from uqs@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t15K8wOl019109; Thu, 5 Feb 2015 20:08:58 GMT (envelope-from uqs@FreeBSD.org) Message-Id: <201502052008.t15K8wOl019109@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: uqs set sender to uqs@FreeBSD.org using -f From: Ulrich Spoerlein Date: Thu, 5 Feb 2015 20:08:58 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46259 - head/share/pgpkeys X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Feb 2015 20:08:58 -0000 Author: uqs (src,ports committer) Date: Thu Feb 5 20:08:57 2015 New Revision: 46259 URL: https://svnweb.freebsd.org/changeset/doc/46259 Log: Update my PGP key. Modified: head/share/pgpkeys/uqs.key Modified: head/share/pgpkeys/uqs.key ============================================================================== --- head/share/pgpkeys/uqs.key Thu Feb 5 19:34:02 2015 (r46258) +++ head/share/pgpkeys/uqs.key Thu Feb 5 20:08:57 2015 (r46259) @@ -1,74 +1,135 @@ -uid Ulrich Spoerlein -uid Ulrich Sp旦rlein (The FreeBSD Project) -uid Ulrich Sp旦rlein -sub 2048R/162E8BD2 2010-01-27 [expires: 2015-01-26] +pub 4096R/B63B27B647B7ECAA 2015-02-05 [expires: 2018-02-04] + Key fingerprint = 1AA3 5EEA C54B B1CD E11D 4CFE B63B 27B6 47B7 ECAA +uid Ulrich Sp旦rlein +uid Ulrich Sp旦rlein (The FreeBSD Project) +uid Ulrich Spoerlein +sub 4096R/FF9F5004BCAC9ABE 2015-02-05 [expires: 2018-02-04] + Key fingerprint = 056D CC69 B995 7125 E3B1 E04B FF9F 5004 BCAC 9ABE +sub 4096R/B3E58E5279652B6E 2015-02-05 [expires: 2018-02-04] + Key fingerprint = 59D8 A3AD 344A 15B5 071C DBDD B3E5 8E52 7965 2B6E + ]]> From owner-svn-doc-head@FreeBSD.ORG Fri Feb 6 19:45:21 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id C885B552; Fri, 6 Feb 2015 19:45:21 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id AFB68211; Fri, 6 Feb 2015 19:45:21 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t16JjLAh094609; Fri, 6 Feb 2015 19:45:21 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t16JjLOG094608; Fri, 6 Feb 2015 19:45:21 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201502061945.t16JjLOG094608@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Fri, 6 Feb 2015 19:45:21 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46260 - head/en_US.ISO8859-1/htdocs/releases/10.1R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 Feb 2015 19:45:21 -0000 Author: gjb Date: Fri Feb 6 19:45:20 2015 New Revision: 46260 URL: https://svnweb.freebsd.org/changeset/doc/46260 Log: Regen after r278328 Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html Thu Feb 5 20:08:57 2015 (r46259) +++ head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html Fri Feb 6 19:45:20 2015 (r46260) @@ -1,5 +1,5 @@ -FreeBSD 10.1-RELEASE Errata

FreeBSD 10.1-RELEASE Errata

The FreeBSD Project

FreeBSD 10.1-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered @@ -13,7 +13,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - symbol.

Last modified on 2015-02-05 by gjb.
Abstract

This document lists errata items for FreeBSD 10.1-RELEASE, + symbol.

Last modified on 2015-02-06 by gjb.
Abstract

This document lists errata items for FreeBSD 10.1-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information @@ -101,7 +101,19 @@ boot

dvd1.iso installer.

Finally, bootstrap pkg(8) from the ISO, and install required packages:

# pkg bootstrap
-# pkg install xorg-server xorg gnome2 [...]

5.Late-Breaking News

No news.

This file, and other release-related documents, +# pkg install xorg-server xorg gnome2 [...]

  • [2015-02-06] Affects binary upgrade + users: The second phase of + freebsd-update install, the phase where + the running userland is upgraded, fails on systems deployed + with nss_ldap enabled in + nsswitch.conf(5) when upgrading from 10.0-RELEASE to + 10.1-RELEASE.

    A workaround is to disable nss_ldap + in nsswitch.conf(5) prior to running + freebsd-update install to upgrade the + userland, after which it can be enabled again when the + upgrade process is completed.

    The problem is being investigated, and an Errata Notice + is expected to be issued when a solution to the problem is + identified.

  • 5.Late-Breaking News

    No news.

    This file, and other release-related documents, can be downloaded from https://www.FreeBSD.org/snapshots/.

    For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

    All users of FreeBSD 10.1-STABLE should From owner-svn-doc-head@FreeBSD.ORG Fri Feb 6 22:07:59 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id A2BB441B; Fri, 6 Feb 2015 22:07:59 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8EF7F5E6; Fri, 6 Feb 2015 22:07:59 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t16M7xZp062118; Fri, 6 Feb 2015 22:07:59 GMT (envelope-from jgh@FreeBSD.org) Received: (from jgh@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t16M7xRj062117; Fri, 6 Feb 2015 22:07:59 GMT (envelope-from jgh@FreeBSD.org) Message-Id: <201502062207.t16M7xRj062117@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: jgh set sender to jgh@FreeBSD.org using -f From: Jason Helfman Date: Fri, 6 Feb 2015 22:07:59 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46261 - head/en_US.ISO8859-1/books/handbook/serialcomms X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 Feb 2015 22:07:59 -0000 Author: jgh Date: Fri Feb 6 22:07:58 2015 New Revision: 46261 URL: https://svnweb.freebsd.org/changeset/doc/46261 Log: - address typo which causes a failed boot sequence PR: 197244 Differential Revision: https://reviews.freebsd.org/D1760 Reported by: dal36@gmx.co.uk Approved by: bcr (mentor) Modified: head/en_US.ISO8859-1/books/handbook/serialcomms/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/serialcomms/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/serialcomms/chapter.xml Fri Feb 6 19:45:20 2015 (r46260) +++ head/en_US.ISO8859-1/books/handbook/serialcomms/chapter.xml Fri Feb 6 22:07:58 2015 (r46261) @@ -2159,8 +2159,7 @@ boot: - Add the boot option to + Add the boot option to /boot.config, replacing 19200 with the speed to use.