Improve wording in recent advisories.

Submitted by:	gavin
This commit is contained in:
Gleb Smirnoff 2015-11-05 11:43:55 +00:00
parent c54838003f
commit 1b86cf5a1f
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=47742
2 changed files with 36 additions and 38 deletions

View file

@ -32,7 +32,7 @@ pieces of kernel code termed filters.
II. Problem Description II. Problem Description
Due to int usage for file offsets in the VOP_WRITE_(PRE|POST) macros, Due to int usage for file offsets in the VOP_WRITE_(PRE|POST) macros,
kqueue(2) write events for files greater 2GB where never fired. kqueue(2) write events for files greater 2GB were never fired.
III. Impact III. Impact
@ -115,19 +115,18 @@ The latest revision of this Errata Notice is available at
https://security.FreeBSD.org/advisories/FreeBSD-EN-15:19.kqueue.asc https://security.FreeBSD.org/advisories/FreeBSD-EN-15:19.kqueue.asc
-----BEGIN PGP SIGNATURE----- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBCgAGBQJWOe7vAAoJEO1n7NZdz2rneAkP/0FCRnyH6vkJFZBbfdIQY5u7 iQIcBAEBCgAGBQJWO0CQAAoJEO1n7NZdz2rncxwQAI23lPRsG84/XneSK4GtnvE7
XPSbSD+2847aJRWw/xU+FWHsFjjcfKrvKqgRtdZXkTBe3FjTgiNbf6jQRCSy0f6u Et/mwOmiueKVQuxC4NpIOSDzgdErOWYKy9WWzx8Rqy9AOIK1Bhi37E4weiX0xrGM
odcPXt4ZprXmhn6BOsyF92NgDHE5VXIiO1h0Jz1Y/+PTi/52BjNbevGUox6VpbMc Ib85qH96KapaD91TnEnzw/yBjdIX7MAbLWegVCdF/cWI/zr9vgZVj1G/4z6e572u
t9XwxuARKG5bSNU+QdWdilP4H//+SAxuhK4Y96i6pccbT51DoO3ACCa8EpuOJYW9 31n1JBxLV1NH6KZ5GZ0gEj7PxYaQaTao1TFU4/qFjJGd3vNzSGPzcWaJfG4kVty0
elXTQbB4XC1n0EATr5gtTwKE+5/yPDEgl9pPNjsN8UTWCqzPwxPTwfplf3idN5Vq 2EMa7stz/FyVNP2HUYco1C4VFqELxzvOUAcGWbwS4E6iNa74eU6CoKPcKwK1sr7v
Oe5YIiI5aaAE16fSYUkIZR0kZ/ScR6gbmc2ALKRtHPa4+9g9TpNINpfmreV2htfH Kz9wLfvnmd3FBNtJ8aj/mEP7ZfXNsWodiGiqQOoGZFX94sd3ILPluVxyVYlCgz8H
CrUW4qGZaoABpX1X2sFJ6su2NCgW3DliOuSAJUyK8Re2XEJZVfcVauyWaZxocJhu pWnQ83SIZbecuhheQ+jN8nLbNU0ArCjpio7CnCs/Lr4/yf8lJGRYmGujzqCSbYKh
NRoH8yBoLJKrPB0Z3Dr9eygmDNGEvaFUB/ZpbeCbyebwyFTmTMUshwfZwcfPftaB X09+i9Tk69L5xnHxvLm52fCe9cZ3kwvqlkBqoTdGO0xiBzA3hBsvUcMLGqL4wGGf
bNd+R4J9UkY5wJWYUve7VpGDY2L6+j2MoPnlZJDfZZpYmFByD/GmdV5Pxxl4yEj3 UeM11Iz5lN+ADeRrsQPiJo5tqUZFoz4Nwa2rZy2dgsxq2lotTat+S9NSRAjD0OAC
2DBevZIGOGlH9E26JrPTcCYjkX15OS0KUkWQy7xv1jdxXCZ4AVbRq8CRiFdQ2JPU m++knQnljh9G/uxf+aj5XsEFzhmi0W3rh+xT0sUK2vSL+wI88Bpq5SDsNzPfqzUx
uSsrwgrGPdYkku0k6xXbb5YDw4475lQPAy9gMSeEDCqcl4GjKf1AVbrN9Jq73C8o 9ixHPZ5huiPwj5j1MvIgPdDsOwaPorAoMklmX4ubW/eTQ1u9RmbbpO875NelOVJb
c65YAK83vX3x9HDWCrss 8wzl10l1Ex+YkzpATn6p
=OODP =U715
-----END PGP SIGNATURE----- -----END PGP SIGNATURE-----

View file

@ -192,12 +192,12 @@ FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility. detached PGP signature using your PGP utility.
[*** v1.1 NOTE ***] If your sources are not yet patched using initial [*** v1.1 NOTE ***] If your sources are not yet patched using the initially
advisory patches, then you need to apply full patches named ntp-NNN.patch, published advisory patches, then you need to apply the full patches named
where NNN stands for the release version. If your sources are already ntp-NNN.patch, where NNN stands for the release version. If your sources
updated, or patched with patches from initial advisory, then you need to are already updated, or patched with patches from the initial advisory,
apply incremental patches, named ntp-NNN-inc.patch, where NNN stands for then you need to apply incremental patches, named ntp-NNN-inc.patch, where
the release version. NNN stands for the release version.
[FreeBSD 10.2-RELEASE-p5, not patched with initial SA-15:25 patch] [FreeBSD 10.2-RELEASE-p5, not patched with initial SA-15:25 patch]
# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102.patch.xz # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102.patch.xz
@ -217,17 +217,17 @@ the release version.
# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93.patch.asc # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93.patch.asc
# gpg --verify ntp-93.patch.asc # gpg --verify ntp-93.patch.asc
[FreeBSD 10.2-RELEASE-p6, initial SA-15:25 patch applied] [FreeBSD 10.2-RELEASE-p6, initial SA-15:25 patch already applied]
# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102-inc.patch # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102-inc.patch
# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102-inc.patch.asc # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102-inc.patch.asc
# gpg --verify ntp-102-inc.patch.asc # gpg --verify ntp-102-inc.patch.asc
[FreeBSD 10.1-RELEASE-p23, initial SA-15:25 patch applied] [FreeBSD 10.1-RELEASE-p23, initial SA-15:25 patch already applied]
# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101-inc.patch # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101-inc.patch
# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101-inc.patch.asc # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101-inc.patch.asc
# gpg --verify ntp-101-inc.patch.asc # gpg --verify ntp-101-inc.patch.asc
[FreeBSD 9.3-RELEASE-p29, initial SA-15:25 patch applied] [FreeBSD 9.3-RELEASE-p29, initial SA-15:25 patch already applied]
# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93-inc.patch # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93-inc.patch
# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93-inc.patch.asc # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93-inc.patch.asc
# gpg --verify ntp-93-inc.patch.asc # gpg --verify ntp-93-inc.patch.asc
@ -290,19 +290,18 @@ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871
The latest revision of this advisory is available at The latest revision of this advisory is available at
https://security.FreeBSD.org/advisories/FreeBSD-SA-15:25.ntp.asc https://security.FreeBSD.org/advisories/FreeBSD-SA-15:25.ntp.asc
-----BEGIN PGP SIGNATURE----- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBCgAGBQJWOe7GAAoJEO1n7NZdz2rnzLUQAOugJiyGHZFYllUnCF/EBFoo iQIcBAEBCgAGBQJWO0BSAAoJEO1n7NZdz2rnWDAP/3wOSIgZg3IlD15HT34YRcEm
UIKc3RjWAqreJ5Mg0upKqI7i2oHw4/VjxVjdvwdp7E5t6b+/LYA5jDCfO/RcuMMS 6fskKKLv8RUMpLvmxjuoUZemC6kA+80x7M4dzTLrq1RduQ33gHaEWr16O5SZKO6V
SZDyC2BWGq8kkSuwNZmo1js1WRUsdpTQPr3TLvoTh/o1w5D0ncLgqJz7IeuqlHer fVDTA+iVSA9Kuh/K+dR8AppGki1ashVrzL3+0vUaya3rF15TagSwKdXN3N06mvwU
2VG5yJP30OUyF1cdk4E9LJcDXx24u8iP0DN5e/0XJGST5/trp/+VYpMy7Vm8dv1l Pm6NnC+WXQJdj6MoSfjupsmO5L86tq57lShlUF3LN1wUANZzsRLvxTZZfQFKSaBr
IQks3wtU4tI574rQKjmAiQyRnvLq0TJ4v/eHHKP4PkMC6FNFUyJx0OhVqZdqWJXz UnVVPpPw3Vp+OCAYcZd+6c1cNLk6bVPWaByfuUqRO8IN6I6yLUIK6h5rW9kEoSJH
ynT28JY5d1SsiPlhUDfSRKGjdpi4kC4szv7ceCuAwmWiDlsNqinKadu9bz4Rwudt phBdqzfMxc57zrRg4lFu/hMUaCR3ag6o3CAG9QyXakc90o4TBT8+DblOPUdAPjix
qlgJZRmtoFcyeReHckZmEwcmW9hPT3i98kjWs83vZqGD9bw7Zt05HfZ/TPyTk3tg cRGOhWOiMeKQVapf/tIcPCJkZP3VGRvZBWJal9F312zJpeq8ZvVWG9WHlkE8kCSk
ec1Dmvhx4s9jprypuThPgs3W7KlgnvdpYdc2aagiU/dqvTArzVuWeLP0ryo269CD kzw0R39CsWPaBSjAKOjd9M+6wU+YKqyy4/yXAqP40mgm349gavXgI4FRLohYTmfa
ZWbgVrfFZjhvi+/nUJD+eMoVLsJYBhNZoJEv7NvUSWizVE4bfD4oFkAxEHBpXxVo l3HMhhq8ojfVefrnksu/kOjK/AC7guxL+ITNtTIwJj/x9fY2aeuNJkHY6S4ZxMpB
VKt5V6edVR0rdmI3xFkiP8372UPbYN8KUfa1R5y4GWPbORv/Z5Wb/XAVmGlvkHNj iJ/myfT7CD25dwSn8+6diz7vY6EKJLMjJVyAoPwxzfauGfShKUh45dWjROmsHlox
U0bmAWv5XOw3CtwFJnRaATl/H5+WqQOVthxvT9EHvt8fHczAq8HvDHS7bIrFDEdN ZK8W+7kd9eyz4MIgeavCQkJeLVB8XlkcIE/sPTKYJJmC2cLXHne9Bb4ESmBWqFbO
gVRXzv6oTlBVGq6sP17H trMs4i6fkKu+17W4K+kr
=Jtlu =vurk
-----END PGP SIGNATURE----- -----END PGP SIGNATURE-----