From 32042469a92eff953d5334ad45dfbac22b62797c Mon Sep 17 00:00:00 2001 From: Glen Barber Date: Tue, 8 Jul 2014 23:11:05 +0000 Subject: [PATCH] Regen after r268439 Approved by: re (implicit) Sponsored by: The FreeBSD Foundation --- en_US.ISO8859-1/htdocs/releases/10.0R/errata.html | 7 ++++--- en_US.ISO8859-1/htdocs/releases/9.2R/errata.html | 9 +++++---- 2 files changed, 9 insertions(+), 7 deletions(-) diff --git a/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html b/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html index d13567a06d..34bb46af5c 100644 --- a/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html +++ b/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html @@ -1,5 +1,5 @@ -FreeBSD 10.0-RELEASE Errata

FreeBSD 10.0-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of +FreeBSD 10.0-RELEASE Errata

FreeBSD 10.0-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United @@ -12,7 +12,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

Last modified on 2014-06-25 by gjb.
Abstract

This document lists errata items for FreeBSD 10.0-RELEASE, + ® symbol.

Last modified on 2014-07-08 by gjb.
Abstract

This document lists errata items for FreeBSD 10.0-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. @@ -45,7 +45,8 @@ vulnerability

SA-14:11.sendmail3 June 2014

Fix sendmail improper close-on-exec flag handling

SA-14:13.pam3 June 2014

Fix incorrect error handling in PAM policy parser

SA-14:14.openssl5 June 2014

Multiple vulnerabilities

SA-14:15.iconv24 June 2014

NULL pointer dereference and out-of-bounds - array access

SA-14:16.file24 June 2014

Multiple vulnerabilities

3. Open Issues

  • FreeBSD/i386 10.0-RELEASE running as a guest + array access

    SA-14:16.file24 June 2014

    Multiple vulnerabilities

    SA-14:17.kmem8 July 2014

    Kernel memory disclosure in control messages + and SCTP notifications

3. Open Issues

  • FreeBSD/i386 10.0-RELEASE running as a guest operating system on VirtualBox can have a problem with disk I/O access. It depends on some specific hardware configuration and does not depend on a diff --git a/en_US.ISO8859-1/htdocs/releases/9.2R/errata.html b/en_US.ISO8859-1/htdocs/releases/9.2R/errata.html index 915869c80c..311050ddb1 100644 --- a/en_US.ISO8859-1/htdocs/releases/9.2R/errata.html +++ b/en_US.ISO8859-1/htdocs/releases/9.2R/errata.html @@ -1,5 +1,5 @@ -FreeBSD 9.2-RELEASE Errata

    FreeBSD 9.2-RELEASE Errata

    +FreeBSD 9.2-RELEASE Errata

    FreeBSD 9.2-RELEASE Errata

    The FreeBSD Project

    FreeBSD is a registered trademark of the FreeBSD Foundation.

    Intel, Celeron, EtherExpress, i386, @@ -14,7 +14,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

    Last modified on 2014-06-25 by gjb.
    Abstract

    This document lists errata items for FreeBSD 9.2-RELEASE, + ® symbol.

    Last modified on 2014-07-08 by gjb.
    Abstract

    This document lists errata items for FreeBSD 9.2-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. @@ -36,7 +36,7 @@ which keep up-to-date mirrors of this location.

    Source and binary snapshots of FreeBSD 9.3-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).

    For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.

    2. Security Advisories

    Problems described in the following security advisories have - been fixed in 9.2-RELEASE. For more information, consult + been fixed in 9.3-RELEASE. For more information, consult the individual advisories available from http://security.FreeBSD.org/.

    AdvisoryDateTopic
    SA-14:01.bsnmpd1 January 2014

    Fix bsnmpd remote denial of service vulnerability

    SA-14:02.ntpd1 January 2014

    Fix ntpd distributed reflection Denial of @@ -45,7 +45,8 @@ Attack

    SA-14:08.tcp30 April 2014

    Fix TCP reassembly vulnerability

    SA-14:11.sendmail3 June 2014

    Fix sendmail improper close-on-exec flag handling

    SA-14:12.ktrace3 June 2014

    Fix ktrace memory disclosure

    SA-14:13.pam3 June 2014

    Fix incorrect error handling in PAM policy - parser

    SA-14:14.openssl5 June 2014

    Multiple vulnerabilities

    SA-14:16.file24 June 2014

    Multiple vulnerabilities

    3. Late-Breaking News

    No late-breaking news.

    This file, and other release-related documents, + parser

    SA-14:14.openssl5 June 2014

    Multiple vulnerabilities

    SA-14:16.file24 June 2014

    Multiple vulnerabilities

    SA-14:17.kmem8 July 2014

    Kernel memory disclosure in control messages + and SCTP notifications

    3. Late-Breaking News

    No late-breaking news.

    This file, and other release-related documents, can be downloaded from http://www.FreeBSD.org/releases/.

    For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

    All users of FreeBSD 9.3-STABLE should