Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 8 Aug 2016 23:18:27 +0000 (UTC)
From:      Glen Barber <gjb@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-stable@freebsd.org, svn-src-stable-10@freebsd.org
Subject:   svn commit: r303861 - in stable: 10/release/doc/share/xml 9/release/doc/share/xml
Message-ID:  <201608082318.u78NIRWW011423@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: gjb
Date: Mon Aug  8 23:18:27 2016
New Revision: 303861
URL: https://svnweb.freebsd.org/changeset/base/303861

Log:
  Document missing ENs and SAs.
  
  Reviewed by:	brd
  Sponsored by:	The FreeBSD Foundation

Modified:
  stable/10/release/doc/share/xml/errata.xml
  stable/10/release/doc/share/xml/security.xml

Changes in other areas also in this revision:
Modified:
  stable/9/release/doc/share/xml/errata.xml
  stable/9/release/doc/share/xml/security.xml

Modified: stable/10/release/doc/share/xml/errata.xml
==============================================================================
--- stable/10/release/doc/share/xml/errata.xml	Mon Aug  8 21:45:39 2016	(r303860)
+++ stable/10/release/doc/share/xml/errata.xml	Mon Aug  8 23:18:27 2016	(r303861)
@@ -19,7 +19,34 @@
 
     <tbody>
       <row>
-	<entry><para></para></entry>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-EN-16:06.libc.asc">FreeBSD-EN-16:06.libc</link></entry>
+	<entry>4&nbsp;May&nbsp;2016</entry>
+	<entry><para>Performance regression in libc
+	    &man.hash.3;</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-EN-16:07.ipi.asc">FreeBSD-EN-16:07.ipi</link></entry>
+	<entry>4&nbsp;May&nbsp;2016</entry>
+	<entry><para>Excessive latency in x86 IPI
+	    delivery</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-EN-16:08.zfs.asc">FreeBSD-EN-16:08.zfs</link></entry>
+	<entry>4&nbsp;May&nbsp;2016</entry>
+	<entry><para>Memory leak in ZFS</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-EN-16:09.freebsd-update.asc">FreeBSD-EN-16:09.freebsd-update</link></entry>
+	<entry>25&nbsp;July&nbsp;2016</entry>
+	<entry><para>Fix &man.freebsd-update.8; support of
+	    &os;&nbsp;11.0-RELEASE</para></entry>
       </row>
     </tbody>
   </tgroup>

Modified: stable/10/release/doc/share/xml/security.xml
==============================================================================
--- stable/10/release/doc/share/xml/security.xml	Mon Aug  8 21:45:39 2016	(r303860)
+++ stable/10/release/doc/share/xml/security.xml	Mon Aug  8 23:18:27 2016	(r303861)
@@ -19,7 +19,81 @@
 
     <tbody>
       <row>
-	<entry><para></para></entry>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-SA-16:09.ntp.asc">FreeBSD-SA-16:09.ntp</link></entry>
+	<entry>29&nbsp;April&nbsp;2016</entry>
+	<entry><para>Multiple <application>ntp</application>
+	    vulnerabilities.</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-SA-16:17.openssl.asc">FreeBSD-SA-16:17.openssl</link></entry>
+	<entry>29&nbsp;April&nbsp;2016</entry>
+	<entry><para>Multiple <application>OpenSSL</application>
+	    vulnerabilities.</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-SA-16:18.atkbd.asc">FreeBSD-SA-16:18.atkbd</link></entry>
+	<entry>17&nbsp;May&nbsp;2016</entry>
+	<entry><para>Keyboard driver buffer overflow</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-SA-16:19.sendmsg.asc">FreeBSD-SA-16:19.sendmsg</link></entry>
+	<entry>17&nbsp;May&nbsp;2016</entry>
+	<entry><para>Incorrect argument handling in
+	    &man.sendmsg.2;</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-SA-16:20.linux.asc">FreeBSD-SA-16:20.linux</link></entry>
+	<entry>31&nbsp;May&nbsp;2016</entry>
+	<entry><para>Kernel stack disclosure in Linux compatibility
+	  layer</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-SA-16:21.43bsd.asc">FreeBSD-SA-16:21.43bsd</link></entry>
+	<entry>31&nbsp;May&nbsp;2016</entry>
+	<entry><para>Kernel stack disclosure in 4.3BSD compatibility
+	  layer</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-SA-16:22.libarchive.asc">FreeBSD-SA-16:22.libarchive</link></entry>
+	<entry>31&nbsp;May&nbsp;2016</entry>
+	<entry><para>Absolute path traversal
+	    vulnerability</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-SA-16:23.libarchive.asc">FreeBSD-SA-16:23.libarchive</link></entry>
+	<entry>31&nbsp;May&nbsp;2016</entry>
+	<entry><para>Absolute path traversal
+	    vulnerability</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-SA-16:24.ntp.asc">FreeBSD-SA-16:24.ntp</link></entry>
+	<entry>3&nbsp;June&nbsp;2016</entry>
+	<entry><para>Multiple <application>ntp</application>
+	    vulnerabilties</para></entry>
+      </row>
+
+      <row>
+	<entry><link
+	    xlink:href="&security.url;/FreeBSD-SA-16:25.bspatch.asc">FreeBSD-SA-16:25.bspatch</link></entry>
+	<entry>25&nbsp;July&nbsp;2016</entry>
+	<entry><para>heap overflow vulnerability</para></entry>
       </row>
     </tbody>
   </tgroup>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201608082318.u78NIRWW011423>