Date: Sat, 17 Jan 2009 21:14:38 GMT From: Mats Dufberg <mats@dufberg.se> To: freebsd-gnats-submit@FreeBSD.org Subject: i386/130660: Error in /usr/src/UPDATING in 6.4 Message-ID: <200901172114.n0HLEcsD056802@www.freebsd.org> Resent-Message-ID: <200901172120.n0HLK1Aq021884@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 130660 >Category: i386 >Synopsis: Error in /usr/src/UPDATING in 6.4 >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-i386 >State: open >Quarter: >Keywords: >Date-Required: >Class: doc-bug >Submitter-Id: current-users >Arrival-Date: Sat Jan 17 21:20:01 UTC 2009 >Closed-Date: >Last-Modified: >Originator: Mats Dufberg >Release: 6.4 >Organization: >Environment: FreeBSD 6.4-RELEASE-p3 >Description: The file /usr/src/UPDATING says that the latest patch level is p9 instead of p3: # head -20 /usr/src/UPDATING Updating Information for FreeBSD STABLE users This file is maintained and copyrighted by M. Warner Losh <imp@village.org>. See end of file for further details. For commonly done items, please see the COMMON ITEMS: section later in the file. Items affecting the ports and packages system can be found in /usr/ports/UPDATING. Please read that file before running portupgrade. 20090113: p9 FreeBSD-SA-09:03.ntpd, FreeBSD-SA-09:04.bind Correct ntpd cryptographic signature bypass. [09:03] Correct BIND DNSSEC incorrect checks for malformed signatures. [09:04] 20090107: p2 FreeBSD-SA-09:01.lukemftpd, FreeBSD-SA-09:02.openssl Prevent cross-site forgery attacks on lukemftpd(8) due to splitting long commands into multiple requests. [09:01] >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200901172114.n0HLEcsD056802>