Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 5 Feb 2015 19:15:40 +0000 (UTC)
From:      Glen Barber <gjb@FreeBSD.org>
To:        doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org
Subject:   svn commit: r46257 - head/en_US.ISO8859-1/htdocs/releases/9.3R
Message-ID:  <201502051915.t15JFeqS093880@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: gjb
Date: Thu Feb  5 19:15:40 2015
New Revision: 46257
URL: https://svnweb.freebsd.org/changeset/doc/46257

Log:
  Regen after r278273
  
  Sponsored by:	The FreeBSD Foundation

Modified:
  head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html

Modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html	Thu Feb  5 19:11:21 2015	(r46256)
+++ head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html	Thu Feb  5 19:15:40 2015	(r46257)
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 9.3-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc@FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 9.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD
  9.3-RELEASE will be maintained until the EoL of FreeBSD 9.3-STABLE." /><script xmlns="" type="text/javascript" src="/layout/js/google.js"></script></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp61761104"></a>FreeBSD 9.3-RELEASE Errata</h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 9.3-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc@FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 9.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD
  9.3-RELEASE will be maintained until the EoL of FreeBSD 9.3-STABLE." /><script xmlns="" type="text/javascript" src="/layout/js/google.js"></script></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp61843024"></a>FreeBSD 9.3-RELEASE Errata</h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">
     The FreeBSD Project
     </span></h3></div></div><div><p xmlns="http://www.w3.org/1999/xhtml" class="copyright">Copyright © 2015 The FreeBSD Documentation Project</p></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="legalnotice"><a id="trademarks"></a><p xmlns="http://www.w3.org/TR/xhtml1/transitional">FreeBSD is a registered trademark of
   the FreeBSD Foundation. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Intel, Celeron, Centrino, Core, EtherExpress, i386,
@@ -38,13 +38,13 @@
       the snapshot). </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">For a list of all FreeBSD CERT security advisories, see <code xmlns="http://www.w3.org/1999/xhtml" class="uri"><a class="uri" href="http://www.FreeBSD.org/security/" target="_top">http://www.FreeBSD.org/security/</a></code>; or <code xmlns="http://www.w3.org/1999/xhtml" class="uri"><a class="uri" href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/" target="_top">ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/</a></code>. </p></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="security"></a>2. Security Advisories</h2></div></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Problems described in the following security advisories have
       been fixed in 9.3-RELEASE. For more information, consult
       the individual advisories available from
-      <code xmlns="http://www.w3.org/1999/xhtml" class="uri"><a class="uri" href="http://security.FreeBSD.org/" target="_top">http://security.FreeBSD.org/</a></code>. </p><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Advisory</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc" target="_top">SA-14:18.openssl</a></td><td>9 September 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc" target="_top">SA-14:19.tcp</a></td><td>16 September 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Denial of Service in TCP packet
-	    processing. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:20.rtsold.asc" target="_top">SA-14:20.rtsold</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote buffer overflow
-	    vulnerability. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:21.routed.asc" target="_top">SA-14:21.routed</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
-	    vulnerability. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:22.namei.asc" target="_top">SA-14:22.namei</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Memory leak in sandboxed namei
-	    lookup. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:23.openssl.asc" target="_top">SA-14:23.openssl</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulerabilities. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:25.setlogin.asc" target="_top">SA-14:25.setlogin</a></td><td>04 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Kernel stack disclosure. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:26.ftp.asc" target="_top">SA-14:26.ftp</a></td><td>04 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote code execution. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc" target="_top">SA-14:28.file</a></td><td>10 December 2014</td><td><p xmlns="http://www.w3.org/
 TR/xhtml1/transitional">Multiple vulnerabilities in <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=file&amp;sektion=1"><span class="citerefentry"><span class="refentrytitle">file</span>(1)</span></a> and
-	    <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libmagic&amp;sektion=3"><span class="citerefentry"><span class="refentrytitle">libmagic</span>(3)</span></a> </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:29.bind.asc" target="_top">SA-14:29.bind</a></td><td>10 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
-	    vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:31.ntp.asc" target="_top">SA-14:31.ntp</a></td><td>23 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:01.openssl.asc" target="_top">SA-15:01.openssl</a></td><td>14 January 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:02.kmem.asc" target="_top">FreeBSD-SA-15:02.kmem</a></td><td>27 January 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SCTP kernel memory corruption and
+      <code xmlns="http://www.w3.org/1999/xhtml" class="uri"><a class="uri" href="http://security.FreeBSD.org/" target="_top">http://security.FreeBSD.org/</a></code>. </p><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Advisory</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc" target="_top">FreeBSD-SA-14:18.openssl</a></td><td>9 September 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc" target="_top">FreeBSD-SA-14:19.tcp</a></td><td>16 September 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Denial of Service in TCP packet
+	    processing. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:20.rtsold.asc" target="_top">FreeBSD-SA-14:20.rtsold</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote buffer overflow
+	    vulnerability. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:21.routed.asc" target="_top">FreeBSD-SA-14:21.routed</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
+	    vulnerability. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:22.namei.asc" target="_top">FreeBSD-SA-14:22.namei</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Memory leak in sandboxed namei
+	    lookup. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:23.openssl.asc" target="_top">FreeBSD-SA-14:23.openssl</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulerabilities. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:25.setlogin.asc" target="_top">FreeBSD-SA-14:25.setlogin</a></td><td>04 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Kernel stack disclosure. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:26.ftp.asc" target="_top">FreeBSD-SA-14:26.ftp</a></td><td>04 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote code execution. </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc" target="_top">FreeBSD-SA-14:28.file</a></td><td>10 December 2014</td>
 <td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities in <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=file&amp;sektion=1"><span class="citerefentry"><span class="refentrytitle">file</span>(1)</span></a> and
+	    <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libmagic&amp;sektion=3"><span class="citerefentry"><span class="refentrytitle">libmagic</span>(3)</span></a> </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:29.bind.asc" target="_top">FreeBSD-SA-14:29.bind</a></td><td>10 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
+	    vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:31.ntp.asc" target="_top">FreeBSD-SA-14:31.ntp</a></td><td>23 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:01.openssl.asc" target="_top">FreeBSD-SA-15:01.openssl</a></td><td>14 January 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:02.kmem.asc" target="_top">FreeBSD-SA-15:02.kmem</a></td><td>27 January 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SCTP kernel memory corruption and
 	    disclosure vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:03.sctp.asc" target="_top">FreeBSD-SA-15:03.sctp</a></td><td>27 January 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">SCTP stream reset
 	    vulnerability </p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="errata"></a>3. Errata Notices</h2></div></div></div><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Errata</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:10.tzdata.asc" target="_top">FreeBSD-EN-14:10.tzdata</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Time zone data file update </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:11.crypt.asc" target="_top">FreeBSD-EN-14:11.crypt</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Change <a xmlns="http://www.w3.org/19
 99/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=crypt&amp;sektion=3"><span class="citerefentry"><span class="refentrytitle">crypt</span>(3)</span></a> default hashing algorithm
 	    back to DES </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:12.zfs.asc" target="_top">FreeBSD-EN-14:12.zfs</a></td><td>11 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix NFSv4 and ZFS cache consistency



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201502051915.t15JFeqS093880>