Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 5 Nov 2015 11:43:55 +0000 (UTC)
From:      Gleb Smirnoff <glebius@FreeBSD.org>
To:        doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org
Subject:   svn commit: r47742 - head/share/security/advisories
Message-ID:  <201511051143.tA5Bht66056256@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: glebius (src committer)
Date: Thu Nov  5 11:43:55 2015
New Revision: 47742
URL: https://svnweb.freebsd.org/changeset/doc/47742

Log:
  Improve wording in recent advisories.
  
  Submitted by:	gavin

Modified:
  head/share/security/advisories/FreeBSD-EN-15:19.kqueue.asc
  head/share/security/advisories/FreeBSD-SA-15:25.ntp.asc

Modified: head/share/security/advisories/FreeBSD-EN-15:19.kqueue.asc
==============================================================================
--- head/share/security/advisories/FreeBSD-EN-15:19.kqueue.asc	Thu Nov  5 09:32:42 2015	(r47741)
+++ head/share/security/advisories/FreeBSD-EN-15:19.kqueue.asc	Thu Nov  5 11:43:55 2015	(r47742)
@@ -32,7 +32,7 @@ pieces of kernel code termed filters.
 II.  Problem Description
 
 Due to int usage for file offsets in the VOP_WRITE_(PRE|POST) macros,
-kqueue(2) write events for files greater 2GB where never fired.
+kqueue(2) write events for files greater 2GB were never fired.
 
 III. Impact
 
@@ -115,19 +115,18 @@ The latest revision of this Errata Notic
 https://security.FreeBSD.org/advisories/FreeBSD-EN-15:19.kqueue.asc
 
 -----BEGIN PGP SIGNATURE-----
-Version: GnuPG v1
 
-iQIcBAEBCgAGBQJWOe7vAAoJEO1n7NZdz2rneAkP/0FCRnyH6vkJFZBbfdIQY5u7
-XPSbSD+2847aJRWw/xU+FWHsFjjcfKrvKqgRtdZXkTBe3FjTgiNbf6jQRCSy0f6u
-odcPXt4ZprXmhn6BOsyF92NgDHE5VXIiO1h0Jz1Y/+PTi/52BjNbevGUox6VpbMc
-t9XwxuARKG5bSNU+QdWdilP4H//+SAxuhK4Y96i6pccbT51DoO3ACCa8EpuOJYW9
-elXTQbB4XC1n0EATr5gtTwKE+5/yPDEgl9pPNjsN8UTWCqzPwxPTwfplf3idN5Vq
-Oe5YIiI5aaAE16fSYUkIZR0kZ/ScR6gbmc2ALKRtHPa4+9g9TpNINpfmreV2htfH
-CrUW4qGZaoABpX1X2sFJ6su2NCgW3DliOuSAJUyK8Re2XEJZVfcVauyWaZxocJhu
-NRoH8yBoLJKrPB0Z3Dr9eygmDNGEvaFUB/ZpbeCbyebwyFTmTMUshwfZwcfPftaB
-bNd+R4J9UkY5wJWYUve7VpGDY2L6+j2MoPnlZJDfZZpYmFByD/GmdV5Pxxl4yEj3
-2DBevZIGOGlH9E26JrPTcCYjkX15OS0KUkWQy7xv1jdxXCZ4AVbRq8CRiFdQ2JPU
-uSsrwgrGPdYkku0k6xXbb5YDw4475lQPAy9gMSeEDCqcl4GjKf1AVbrN9Jq73C8o
-c65YAK83vX3x9HDWCrss
-=OODP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+=U715
 -----END PGP SIGNATURE-----

Modified: head/share/security/advisories/FreeBSD-SA-15:25.ntp.asc
==============================================================================
--- head/share/security/advisories/FreeBSD-SA-15:25.ntp.asc	Thu Nov  5 09:32:42 2015	(r47741)
+++ head/share/security/advisories/FreeBSD-SA-15:25.ntp.asc	Thu Nov  5 11:43:55 2015	(r47742)
@@ -192,12 +192,12 @@ FreeBSD release branches.
 a) Download the relevant patch from the location below, and verify the
 detached PGP signature using your PGP utility.
 
-[*** v1.1 NOTE ***] If your sources are not yet patched using initial
-advisory patches, then you need to apply full patches named ntp-NNN.patch,
-where NNN stands for the release version.  If your sources are already
-updated, or patched with patches from initial advisory, then you need to
-apply incremental patches, named ntp-NNN-inc.patch, where NNN stands for
-the release version.
+[*** v1.1 NOTE ***] If your sources are not yet patched using the initially
+published advisory patches, then you need to apply the full patches named
+ntp-NNN.patch, where NNN stands for the release version.  If your sources
+are already updated, or patched with patches from the initial advisory,
+then you need to apply incremental patches, named ntp-NNN-inc.patch, where
+NNN stands for the release version.
 
 [FreeBSD 10.2-RELEASE-p5, not patched with initial SA-15:25 patch]
 # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102.patch.xz
@@ -217,17 +217,17 @@ the release version.
 # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93.patch.asc
 # gpg --verify ntp-93.patch.asc
 
-[FreeBSD 10.2-RELEASE-p6, initial SA-15:25 patch applied]
+[FreeBSD 10.2-RELEASE-p6, initial SA-15:25 patch already applied]
 # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102-inc.patch
 # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102-inc.patch.asc
 # gpg --verify ntp-102-inc.patch.asc
 
-[FreeBSD 10.1-RELEASE-p23, initial SA-15:25 patch applied]
+[FreeBSD 10.1-RELEASE-p23, initial SA-15:25 patch already applied]
 # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101-inc.patch
 # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101-inc.patch.asc
 # gpg --verify ntp-101-inc.patch.asc
 
-[FreeBSD 9.3-RELEASE-p29, initial SA-15:25 patch applied]
+[FreeBSD 9.3-RELEASE-p29, initial SA-15:25 patch already applied]
 # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93-inc.patch
 # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93-inc.patch.asc
 # gpg --verify ntp-93-inc.patch.asc
@@ -290,19 +290,18 @@ https://cve.mitre.org/cgi-bin/cvename.cg
 The latest revision of this advisory is available at
 https://security.FreeBSD.org/advisories/FreeBSD-SA-15:25.ntp.asc
 -----BEGIN PGP SIGNATURE-----
-Version: GnuPG v1
 
-iQIcBAEBCgAGBQJWOe7GAAoJEO1n7NZdz2rnzLUQAOugJiyGHZFYllUnCF/EBFoo
-UIKc3RjWAqreJ5Mg0upKqI7i2oHw4/VjxVjdvwdp7E5t6b+/LYA5jDCfO/RcuMMS
-SZDyC2BWGq8kkSuwNZmo1js1WRUsdpTQPr3TLvoTh/o1w5D0ncLgqJz7IeuqlHer
-2VG5yJP30OUyF1cdk4E9LJcDXx24u8iP0DN5e/0XJGST5/trp/+VYpMy7Vm8dv1l
-IQks3wtU4tI574rQKjmAiQyRnvLq0TJ4v/eHHKP4PkMC6FNFUyJx0OhVqZdqWJXz
-ynT28JY5d1SsiPlhUDfSRKGjdpi4kC4szv7ceCuAwmWiDlsNqinKadu9bz4Rwudt
-qlgJZRmtoFcyeReHckZmEwcmW9hPT3i98kjWs83vZqGD9bw7Zt05HfZ/TPyTk3tg
-ec1Dmvhx4s9jprypuThPgs3W7KlgnvdpYdc2aagiU/dqvTArzVuWeLP0ryo269CD
-ZWbgVrfFZjhvi+/nUJD+eMoVLsJYBhNZoJEv7NvUSWizVE4bfD4oFkAxEHBpXxVo
-VKt5V6edVR0rdmI3xFkiP8372UPbYN8KUfa1R5y4GWPbORv/Z5Wb/XAVmGlvkHNj
-U0bmAWv5XOw3CtwFJnRaATl/H5+WqQOVthxvT9EHvt8fHczAq8HvDHS7bIrFDEdN
-gVRXzv6oTlBVGq6sP17H
-=Jtlu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+=vurk
 -----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201511051143.tA5Bht66056256>