svn commit: r48024 - in head/en_US.ISO8859-1/htdocs/releases: 10.2R 9.3R

Glen Barber gjb at FreeBSD.org
Fri Jan 15 05:39:27 UTC 2016


Author: gjb
Date: Fri Jan 15 05:39:25 2016
New Revision: 48024
URL: https://svnweb.freebsd.org/changeset/doc/48024

Log:
  Regen after r294071
  
  Sponsored by:	The FreeBSD Foundation

Modified:
  head/en_US.ISO8859-1/htdocs/releases/10.2R/errata.html
  head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html

Modified: head/en_US.ISO8859-1/htdocs/releases/10.2R/errata.html
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/10.2R/errata.html	Fri Jan 15 05:30:02 2016	(r48023)
+++ head/en_US.ISO8859-1/htdocs/releases/10.2R/errata.html	Fri Jan 15 05:39:25 2016	(r48024)
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 10.2-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc at FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 10.2-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeB
 SD 10.2-RELEASE will be maintained until the release of FreeBSD 10.3-RELEASE." /><script xmlns="" type="text/javascript" src="/layout/js/google.js"></script></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp56968672"></a>FreeBSD 10.2-RELEASE Errata </h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">The FreeBSD Project</span></h3></div></div><div><p xmlns="http://www.w3.org/1999/xhtml" class="copyright">Copyright © 2016 The FreeBSD Documentation
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 10.2-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc at FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 10.2-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeB
 SD 10.2-RELEASE will be maintained until the release of FreeBSD 10.3-RELEASE." /><script xmlns="" type="text/javascript" src="/layout/js/google.js"></script></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp58192736"></a>FreeBSD 10.2-RELEASE Errata </h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">The FreeBSD Project</span></h3></div></div><div><p xmlns="http://www.w3.org/1999/xhtml" class="copyright">Copyright © 2016 The FreeBSD Documentation
 	Project</p></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="legalnotice"><a id="trademarks"></a><p xmlns="http://www.w3.org/TR/xhtml1/transitional">FreeBSD is a registered trademark of
   the FreeBSD Foundation. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Intel, Celeron, Centrino, Core, EtherExpress, i386,
   i486, Itanium, Pentium, and Xeon are trademarks or registered
@@ -35,10 +35,10 @@
       sites which keep up-to-date mirrors of this location. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Source and binary snapshots of FreeBSD 10.2-STABLE also
       contain up-to-date copies of this document (as of the time of
       the snapshot). </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">For a list of all FreeBSD CERT security advisories, see <a xmlns="http://www.w3.org/1999/xhtml" class="link" href="https://www.FreeBSD.org/security/" target="_top">https://www.FreeBSD.org/security/</a>. </p></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="security"></a>2. Security Advisories</h2></div></div></div><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Advisory</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:20.expat.asc" target="_top">FreeBSD-SA-15:20.expat</a></td><td>18 August 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix multiple integer overflows in
-	    <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libbsdxml&sektion=3"><span class="citerefentry"><span class="refentrytitle">libbsdxml</span>(3)</span></a>. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:22.openssh.asc" target="_top">FreeBSD-SA-15:22.openssh</a></td><td>25 August 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:24.rpcbind.asc" target="_top">FreeBSD-SA-15:24.rpcbind</a></td><td>29 September 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:25.ntp.asc" target="_top">FreeBSD-SA-15:25.ntp</a></td><td>26 October 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transiti
 onal">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:26.openssl.asc" target="_top">FreeBSD-SA-15:26.openssl</a></td><td>5 December 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:01.sctp.asc" target="_top">FreeBSD-SA-16:01.sctp</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">ICMPv6 error message vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:02.ntp.asc" target="_top">FreeBSD-SA-16:02.ntp</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Panic threshold bypass
-	    vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:03.linux.asc" target="_top">FreeBSD-SA-16:03.linux</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Incorrect <code xmlns="http://www.w3.org/1999/xhtml" class="literal">futex</code>
-	    handling </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:04.linux.asc" target="_top">FreeBSD-SA-16:04.linux</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=setgroups&sektion=2"><span class="citerefentry"><span class="refentrytitle">setgroups</span>(2)</span></a> system call
-	    vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:05.tcp.asc" target="_top">FreeBSD-SA-16:05.tcp</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">MD5 signature denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:06.bsnmpd.asc" target="_top">FreeBSD-SA-16:06.bsnmpd</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Insecure default configuration file
+	    <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libbsdxml&sektion=3"><span class="citerefentry"><span class="refentrytitle">libbsdxml</span>(3)</span></a>. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:22.openssh.asc" target="_top">FreeBSD-SA-15:22.openssh</a></td><td>25 August 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:24.rpcbind.asc" target="_top">FreeBSD-SA-15:24.rpcbind</a></td><td>29 September 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:25.ntp.asc" target="_top">FreeBSD-SA-15:25.ntp</a></td><td>26 October 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transiti
 onal">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:26.openssl.asc" target="_top">FreeBSD-SA-15:26.openssl</a></td><td>5 December 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:01.sctp.asc" target="_top">FreeBSD-SA-16:01.sctp</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">ICMPv6 error message vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:02.ntp.asc" target="_top">FreeBSD-SA-16:02.ntp</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Panic threshold bypass
+	    vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:03.linux.asc" target="_top">FreeBSD-SA-16:03.linux</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Incorrect <code xmlns="http://www.w3.org/1999/xhtml" class="literal">futex</code>
+	    handling </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:04.linux.asc" target="_top">FreeBSD-SA-16:04.linux</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=setgroups&sektion=2"><span class="citerefentry"><span class="refentrytitle">setgroups</span>(2)</span></a> system call
+	    vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:05.tcp.asc" target="_top">FreeBSD-SA-16:05.tcp</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">MD5 signature denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:06.bsnmpd.asc" target="_top">FreeBSD-SA-16:06.bsnmpd</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Insecure default configuration file
 	  permissions </p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="errata"></a>3. Errata Notices</h2></div></div></div><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Errata</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:11.toolchain.asc" target="_top">FreeBSD-EN-15:11.toolchain</a></td><td>18 August 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=make&sektion=1"><span class="citerefentry"><span class="refentrytitle">make</span>(1)</span></a> syntax errors when upgrading
 	    from FreeBSD 9.x and earlier. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:12.netstat.asc" target="_top">FreeBSD-EN-15:12.netstat</a></td><td>18 August 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix incorrect <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=netstat&sektion=1"><span class="citerefentry"><span class="refentrytitle">netstat</span>(1)</span></a> data handling on
 	    32-bit systems. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-15:13.vidcontrol.asc" target="_top">FreeBSD-EN-15:13.vidcontrol</a></td><td>18 August 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Allow size argument to <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=vidcontrol&sektion=1"><span class="citerefentry"><span class="refentrytitle">vidcontrol</span>(1)</span></a> for

Modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html	Fri Jan 15 05:30:02 2016	(r48023)
+++ head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html	Fri Jan 15 05:39:25 2016	(r48024)
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 9.3-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc at FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 9.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD
  9.3-RELEASE will be maintained until the EoL of FreeBSD 9.3-STABLE." /><script xmlns="" type="text/javascript" src="/layout/js/google.js"></script></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp56895072"></a>FreeBSD 9.3-RELEASE Errata</h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 9.3-RELEASE Errata</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="mailto:doc at FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="This document lists errata items for FreeBSD 9.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information includes security advisories, as well as news relating to the software or documentation that could affect its operation or usability. An up-to-date version of this document should always be consulted before installing this version of FreeBSD. This errata document for FreeBSD
  9.3-RELEASE will be maintained until the EoL of FreeBSD 9.3-STABLE." /><script xmlns="" type="text/javascript" src="/layout/js/google.js"></script></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp60958816"></a>FreeBSD 9.3-RELEASE Errata</h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">
     The FreeBSD Project
     </span></h3></div></div><div><p xmlns="http://www.w3.org/1999/xhtml" class="copyright">Copyright © 2016 The FreeBSD Documentation Project</p></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="legalnotice"><a id="trademarks"></a><p xmlns="http://www.w3.org/TR/xhtml1/transitional">FreeBSD is a registered trademark of
   the FreeBSD Foundation. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Intel, Celeron, Centrino, Core, EtherExpress, i386,
@@ -55,10 +55,10 @@
 	    vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:20.expat.asc" target="_top">FreeBSD-SA-15:20.expat</a></td><td>18 August 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix multiple integer overflows in
 	    <a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=libbsdxml&sektion=3"><span class="citerefentry"><span class="refentrytitle">libbsdxml</span>(3)</span></a>. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:21.amd64.asc" target="_top">FreeBSD-SA-15:21.amd64</a></td><td>25 August 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix local privilege escalation in IRET
 	    handler. </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:22.openssh.asc" target="_top">FreeBSD-SA-15:22.openssh</a></td><td>25 August 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:23.bind.asc" target="_top">FreeBSD-SA-15:23.bind</a></td><td>2 September 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service
-	    vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:24.rpcbind.asc" target="_top">FreeBSD-SA-15:24.rpcbind</a></td><td>29 September 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:25.ntp.asc" target="_top">FreeBSD-SA-15:25.ntp</a></td><td>26 October 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:26.openssl.asc" target="_top">FreeBSD-SA-15:26.openssl</a></td><td>5 December 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:27.bind.asc" target="_top">FreeBSD-SA-15:27.bind</a></td><td>16 December
  2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:01.sctp.asc" target="_top">FreeBSD-SA-16:01.sctp</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">ICMPv6 error message vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:02.ntp.asc" target="_top">FreeBSD-SA-16:02.ntp</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Panic threshold bypass
-	    vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:03.linux.asc" target="_top">FreeBSD-SA-16:03.linux</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Incorrect <code xmlns="http://www.w3.org/1999/xhtml" class="literal">futex</code>
-	    handling </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:04.linux.asc" target="_top">FreeBSD-SA-16:04.linux</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=setgroups&sektion=2"><span class="citerefentry"><span class="refentrytitle">setgroups</span>(2)</span></a> system call
-	    vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:05.tcp.asc" target="_top">FreeBSD-SA-16:05.tcp</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">MD5 signature denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:06.bsnmpd.asc" target="_top">FreeBSD-SA-16:06.bsnmpd</a></td><td>15 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Insecure default configuration file
+	    vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:24.rpcbind.asc" target="_top">FreeBSD-SA-15:24.rpcbind</a></td><td>29 September 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:25.ntp.asc" target="_top">FreeBSD-SA-15:25.ntp</a></td><td>26 October 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:26.openssl.asc" target="_top">FreeBSD-SA-15:26.openssl</a></td><td>5 December 2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-15:27.bind.asc" target="_top">FreeBSD-SA-15:27.bind</a></td><td>16 December
  2015</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Remote denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:01.sctp.asc" target="_top">FreeBSD-SA-16:01.sctp</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">ICMPv6 error message vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:02.ntp.asc" target="_top">FreeBSD-SA-16:02.ntp</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Panic threshold bypass
+	    vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:03.linux.asc" target="_top">FreeBSD-SA-16:03.linux</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Incorrect <code xmlns="http://www.w3.org/1999/xhtml" class="literal">futex</code>
+	    handling </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:04.linux.asc" target="_top">FreeBSD-SA-16:04.linux</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional"><a xmlns="http://www.w3.org/1999/xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=setgroups&sektion=2"><span class="citerefentry"><span class="refentrytitle">setgroups</span>(2)</span></a> system call
+	    vulnerability </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:05.tcp.asc" target="_top">FreeBSD-SA-16:05.tcp</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">MD5 signature denial of service </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-SA-16:06.bsnmpd.asc" target="_top">FreeBSD-SA-16:06.bsnmpd</a></td><td>14 January 2016</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Insecure default configuration file
 	  permissions </p></td></tr></tbody></table></div></div><div class="sect1"><div xmlns="" class="titlepage"><div><div><h2 xmlns="http://www.w3.org/1999/xhtml" class="title" style="clear: both"><a id="errata"></a>3. Errata Notices</h2></div></div></div><div class="informaltable"><table width="100%" border="0"><colgroup><col width="40%" /><col width="30%" /><col width="30%" /></colgroup><thead><tr><th>Errata</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:10.tzdata.asc" target="_top">FreeBSD-EN-14:10.tzdata</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Time zone data file update </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:11.crypt.asc" target="_top">FreeBSD-EN-14:11.crypt</a></td><td>21 October 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Change <a xmlns="http://www.w3.org/1999
 /xhtml" class="citerefentry" href="http://www.FreeBSD.org/cgi/man.cgi?query=crypt&sektion=3"><span class="citerefentry"><span class="refentrytitle">crypt</span>(3)</span></a> default hashing algorithm
 	    back to DES </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:12.zfs.asc" target="_top">FreeBSD-EN-14:12.zfs</a></td><td>11 November 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fix NFSv4 and ZFS cache consistency
 	    issue </p></td></tr><tr><td><a class="link" href="https://www.FreeBSD.org/security/advisories/FreeBSD-EN-14:13.freebsd-update.asc" target="_top">FreeBSD-EN-14:13.freebsd-update</a></td><td>23 December 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Fixed directory deletion issue in


More information about the svn-doc-all mailing list