Update relnotes for upcoming 6.4R.

This commit is contained in:
Hiroki Sato 2008-11-28 15:27:45 +00:00
parent 97f9c2434e
commit 589b0bb6ed
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=33310
6 changed files with 95 additions and 20 deletions

View file

@ -1,4 +1,4 @@
# $FreeBSD: www/en/releases/6.4R/Makefile,v 1.1 2008/08/22 14:30:38 hrs Exp $
# $FreeBSD: www/en/releases/6.4R/Makefile,v 1.2 2008/11/06 15:47:57 hrs Exp $
.if exists(../Makefile.conf)
.include "../Makefile.conf"
@ -7,13 +7,13 @@
.include "../Makefile.inc"
.endif
#DOCS= announce.sgml
DOCS= relnotes.sgml
DOCS= announce.sgml
DOCS+= relnotes.sgml
DOCS+= hardware.sgml
DOCS+= installation.sgml
DOCS+= schedule.sgml
DATA+= errata.html
DATA= errata.html
DATA+= hardware-alpha.html
DATA+= hardware-amd64.html
DATA+= hardware-i386.html
@ -34,6 +34,6 @@ DATA+= relnotes-pc98.html
DATA+= relnotes-powerpc.html
DATA+= relnotes-sparc64.html
DATA= docbook.css
DATA+= docbook.css
.include "${WEB_PREFIX}/share/mk/web.site.mk"

View file

@ -21,8 +21,8 @@ Notes</a></h1>
2008 The FreeBSD Documentation Project</p>
<p class="PUBDATE">$FreeBSD:
releng/6.4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml 184446 2008-10-29
19:11:03Z hrs $<br />
releng/6.4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml 185279 2008-11-25
02:19:13Z hrs $<br />
</p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -223,6 +223,18 @@ target="_top">SA-08:10.nd6</a></td>
<p>IPv6 Neighbor Discovery Protocol routing vulnerability</p>
</td>
</tr>
<tr>
<td><a href="http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc"
target="_top">SA-08:11.arc4random</a></td>
<td>24&nbsp;November&nbsp;2008</td>
<td>
<p><a
href="http://www.FreeBSD.org/cgi/man.cgi?query=arc4random&sektion=9&manpath=FreeBSD+6.4-RELEASE">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">arc4random</span>(9)</span></a>
predictable sequence vulnerability</p>
</td>
</tr>
</tbody>
</table>
</div>
@ -268,7 +280,10 @@ href="http://www.FreeBSD.org/cgi/man.cgi?query=pidfile&sektion=3&manpath=FreeBSD
library. It also implements recovery from server restarts and ensures that dirty cache
blocks are written to the server before obtaining locks (allowing multiple clients to use
file locking to safely share data). Also, a new kernel option <tt class="LITERAL">options
NFSLOCKD</tt> has been added and enabled by default.</p>
NFSLOCKD</tt> has been added and enabled by default. If the kernel support is enabled, <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=rpc.lockd&sektion=8&manpath=FreeBSD+6.4-RELEASE">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">rpc.lockd</span>(8)</span></a>
automatically detects and uses the functionality.</p>
<div class="SECT3">
<hr />

View file

@ -21,8 +21,8 @@ Notes</a></h1>
2008 The FreeBSD Documentation Project</p>
<p class="PUBDATE">$FreeBSD:
releng/6.4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml 184446 2008-10-29
19:11:03Z hrs $<br />
releng/6.4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml 185279 2008-11-25
02:19:13Z hrs $<br />
</p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -223,6 +223,18 @@ target="_top">SA-08:10.nd6</a></td>
<p>IPv6 Neighbor Discovery Protocol routing vulnerability</p>
</td>
</tr>
<tr>
<td><a href="http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc"
target="_top">SA-08:11.arc4random</a></td>
<td>24&nbsp;November&nbsp;2008</td>
<td>
<p><a
href="http://www.FreeBSD.org/cgi/man.cgi?query=arc4random&sektion=9&manpath=FreeBSD+6.4-RELEASE">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">arc4random</span>(9)</span></a>
predictable sequence vulnerability</p>
</td>
</tr>
</tbody>
</table>
</div>
@ -268,7 +280,10 @@ href="http://www.FreeBSD.org/cgi/man.cgi?query=pidfile&sektion=3&manpath=FreeBSD
library. It also implements recovery from server restarts and ensures that dirty cache
blocks are written to the server before obtaining locks (allowing multiple clients to use
file locking to safely share data). Also, a new kernel option <tt class="LITERAL">options
NFSLOCKD</tt> has been added and enabled by default.</p>
NFSLOCKD</tt> has been added and enabled by default. If the kernel support is enabled, <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=rpc.lockd&sektion=8&manpath=FreeBSD+6.4-RELEASE">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">rpc.lockd</span>(8)</span></a>
automatically detects and uses the functionality.</p>
<div class="SECT3">
<hr />

View file

@ -21,8 +21,8 @@ Notes</a></h1>
2008 The FreeBSD Documentation Project</p>
<p class="PUBDATE">$FreeBSD:
releng/6.4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml 184446 2008-10-29
19:11:03Z hrs $<br />
releng/6.4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml 185279 2008-11-25
02:19:13Z hrs $<br />
</p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -222,6 +222,18 @@ target="_top">SA-08:10.nd6</a></td>
<p>IPv6 Neighbor Discovery Protocol routing vulnerability</p>
</td>
</tr>
<tr>
<td><a href="http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc"
target="_top">SA-08:11.arc4random</a></td>
<td>24&nbsp;November&nbsp;2008</td>
<td>
<p><a
href="http://www.FreeBSD.org/cgi/man.cgi?query=arc4random&sektion=9&manpath=FreeBSD+6.4-RELEASE">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">arc4random</span>(9)</span></a>
predictable sequence vulnerability</p>
</td>
</tr>
</tbody>
</table>
</div>
@ -267,7 +279,10 @@ href="http://www.FreeBSD.org/cgi/man.cgi?query=pidfile&sektion=3&manpath=FreeBSD
library. It also implements recovery from server restarts and ensures that dirty cache
blocks are written to the server before obtaining locks (allowing multiple clients to use
file locking to safely share data). Also, a new kernel option <tt class="LITERAL">options
NFSLOCKD</tt> has been added and enabled by default.</p>
NFSLOCKD</tt> has been added and enabled by default. If the kernel support is enabled, <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=rpc.lockd&sektion=8&manpath=FreeBSD+6.4-RELEASE">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">rpc.lockd</span>(8)</span></a>
automatically detects and uses the functionality.</p>
<div class="SECT3">
<hr />

View file

@ -21,8 +21,8 @@ Notes</a></h1>
2008 The FreeBSD Documentation Project</p>
<p class="PUBDATE">$FreeBSD:
releng/6.4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml 184446 2008-10-29
19:11:03Z hrs $<br />
releng/6.4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml 185279 2008-11-25
02:19:13Z hrs $<br />
</p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -223,6 +223,18 @@ target="_top">SA-08:10.nd6</a></td>
<p>IPv6 Neighbor Discovery Protocol routing vulnerability</p>
</td>
</tr>
<tr>
<td><a href="http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc"
target="_top">SA-08:11.arc4random</a></td>
<td>24&nbsp;November&nbsp;2008</td>
<td>
<p><a
href="http://www.FreeBSD.org/cgi/man.cgi?query=arc4random&sektion=9&manpath=FreeBSD+6.4-RELEASE">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">arc4random</span>(9)</span></a>
predictable sequence vulnerability</p>
</td>
</tr>
</tbody>
</table>
</div>
@ -268,7 +280,10 @@ href="http://www.FreeBSD.org/cgi/man.cgi?query=pidfile&sektion=3&manpath=FreeBSD
library. It also implements recovery from server restarts and ensures that dirty cache
blocks are written to the server before obtaining locks (allowing multiple clients to use
file locking to safely share data). Also, a new kernel option <tt class="LITERAL">options
NFSLOCKD</tt> has been added and enabled by default.</p>
NFSLOCKD</tt> has been added and enabled by default. If the kernel support is enabled, <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=rpc.lockd&sektion=8&manpath=FreeBSD+6.4-RELEASE">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">rpc.lockd</span>(8)</span></a>
automatically detects and uses the functionality.</p>
<div class="SECT3">
<hr />

View file

@ -21,8 +21,8 @@ Notes</a></h1>
2008 The FreeBSD Documentation Project</p>
<p class="PUBDATE">$FreeBSD:
releng/6.4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml 184446 2008-10-29
19:11:03Z hrs $<br />
releng/6.4/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml 185279 2008-11-25
02:19:13Z hrs $<br />
</p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -223,6 +223,18 @@ target="_top">SA-08:10.nd6</a></td>
<p>IPv6 Neighbor Discovery Protocol routing vulnerability</p>
</td>
</tr>
<tr>
<td><a href="http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc"
target="_top">SA-08:11.arc4random</a></td>
<td>24&nbsp;November&nbsp;2008</td>
<td>
<p><a
href="http://www.FreeBSD.org/cgi/man.cgi?query=arc4random&sektion=9&manpath=FreeBSD+6.4-RELEASE">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">arc4random</span>(9)</span></a>
predictable sequence vulnerability</p>
</td>
</tr>
</tbody>
</table>
</div>
@ -268,7 +280,10 @@ href="http://www.FreeBSD.org/cgi/man.cgi?query=pidfile&sektion=3&manpath=FreeBSD
library. It also implements recovery from server restarts and ensures that dirty cache
blocks are written to the server before obtaining locks (allowing multiple clients to use
file locking to safely share data). Also, a new kernel option <tt class="LITERAL">options
NFSLOCKD</tt> has been added and enabled by default.</p>
NFSLOCKD</tt> has been added and enabled by default. If the kernel support is enabled, <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=rpc.lockd&sektion=8&manpath=FreeBSD+6.4-RELEASE">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">rpc.lockd</span>(8)</span></a>
automatically detects and uses the functionality.</p>
<div class="SECT3">
<hr />