From e3b287415b2f7c309df6478fe1cc5b1ac6208051 Mon Sep 17 00:00:00 2001 From: Glen Barber Date: Wed, 25 Jun 2014 00:14:57 +0000 Subject: [PATCH] Regen after r267846 Sponsored by: The FreeBSD Foundation --- en_US.ISO8859-1/htdocs/releases/10.0R/errata.html | 7 ++++--- en_US.ISO8859-1/htdocs/releases/9.2R/errata.html | 4 ++-- 2 files changed, 6 insertions(+), 5 deletions(-) diff --git a/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html b/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html index 4a3b907b55..d13567a06d 100644 --- a/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html +++ b/en_US.ISO8859-1/htdocs/releases/10.0R/errata.html @@ -1,5 +1,5 @@ -FreeBSD 10.0-RELEASE Errata

FreeBSD 10.0-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of +FreeBSD 10.0-RELEASE Errata

FreeBSD 10.0-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United @@ -12,7 +12,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

Last modified on 2014-06-20 by gjb.
Abstract

This document lists errata items for FreeBSD 10.0-RELEASE, + ® symbol.

Last modified on 2014-06-25 by gjb.
Abstract

This document lists errata items for FreeBSD 10.0-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. @@ -44,7 +44,8 @@ vulnerability

SA-14:10.openssl15 May 2014

Fix OpenSSL NULL pointer deference vulnerability

SA-14:11.sendmail3 June 2014

Fix sendmail improper close-on-exec flag handling

SA-14:13.pam3 June 2014

Fix incorrect error handling in PAM policy - parser

SA-14:14.openssl5 June 2014

Multiple vulnerabilities

3. Open Issues

  • FreeBSD/i386 10.0-RELEASE running as a guest + parser

    SA-14:14.openssl5 June 2014

    Multiple vulnerabilities

    SA-14:15.iconv24 June 2014

    NULL pointer dereference and out-of-bounds + array access

    SA-14:16.file24 June 2014

    Multiple vulnerabilities

3. Open Issues

  • FreeBSD/i386 10.0-RELEASE running as a guest operating system on VirtualBox can have a problem with disk I/O access. It depends on some specific hardware configuration and does not depend on a diff --git a/en_US.ISO8859-1/htdocs/releases/9.2R/errata.html b/en_US.ISO8859-1/htdocs/releases/9.2R/errata.html index 89909ba674..915869c80c 100644 --- a/en_US.ISO8859-1/htdocs/releases/9.2R/errata.html +++ b/en_US.ISO8859-1/htdocs/releases/9.2R/errata.html @@ -14,7 +14,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

Last modified on 2014-06-20 by gjb.
Abstract

This document lists errata items for FreeBSD 9.2-RELEASE, + ® symbol.

Last modified on 2014-06-25 by gjb.
Abstract

This document lists errata items for FreeBSD 9.2-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. @@ -45,7 +45,7 @@ Attack

SA-14:08.tcp30 April 2014

Fix TCP reassembly vulnerability

SA-14:11.sendmail3 June 2014

Fix sendmail improper close-on-exec flag handling

SA-14:12.ktrace3 June 2014

Fix ktrace memory disclosure

SA-14:13.pam3 June 2014

Fix incorrect error handling in PAM policy - parser

SA-14:14.openssl5 June 2014

Multiple vulnerabilities

3. Late-Breaking News

No late-breaking news.

This file, and other release-related documents, + parser

SA-14:14.openssl5 June 2014

Multiple vulnerabilities

SA-14:16.file24 June 2014

Multiple vulnerabilities

3. Late-Breaking News

No late-breaking news.

This file, and other release-related documents, can be downloaded from http://www.FreeBSD.org/releases/.

For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

All users of FreeBSD 9.3-STABLE should