svn commit: r229685 - stable/9/release/doc/en_US.ISO8859-1/errata

Hiroki Sato hrs at FreeBSD.org
Fri Jan 6 05:12:58 UTC 2012


Author: hrs
Date: Fri Jan  6 05:12:57 2012
New Revision: 229685
URL: http://svn.freebsd.org/changeset/base/229685

Log:
  - Update copyright year.
  - Add SA-11:0[12456789] and -11:10.

Modified:
  stable/9/release/doc/en_US.ISO8859-1/errata/article.sgml

Modified: stable/9/release/doc/en_US.ISO8859-1/errata/article.sgml
==============================================================================
--- stable/9/release/doc/en_US.ISO8859-1/errata/article.sgml	Fri Jan  6 05:08:51 2012	(r229684)
+++ stable/9/release/doc/en_US.ISO8859-1/errata/article.sgml	Fri Jan  6 05:12:57 2012	(r229685)
@@ -39,12 +39,7 @@
     <pubdate>$FreeBSD$</pubdate>
 
     <copyright>
-      <year>2000</year>
-      <year>2001</year>
-      <year>2002</year>
-      <year>2003</year>
-      <year>2004</year>
-      <year>2005</year>
+      <year>2012</year>
       <holder role="mailto:doc at FreeBSD.org">The &os; Documentation Project</holder>
     </copyright>
 
@@ -129,18 +124,97 @@
   <sect1 id="security">
     <title>Security Advisories</title>
 
-<![ %release.type.release [
-    <para>No advisories.</para>
-]]>
-
-<![ %release.type.current [
-    <para>No advisories.</para>
-]]>
-
-<![ %release.type.snapshot [
-    <para>No advisories.</para>
-]]>
-
+    <para>Problems described in the following security advisories have
+      been fixed in &release.current;.  For more information, consult
+      the individual advisories available from <ulink
+	url="http://security.FreeBSD.org/"></ulink>.</para>
+
+    <informaltable frame="none" pgwide="1">
+      <tgroup cols="3">
+      <colspec colwidth="1*">
+      <colspec colwidth="1*">
+      <colspec colwidth="3*">
+
+      <thead>
+	  <row>
+	    <entry>Advisory</entry>
+	    <entry>Date</entry>
+	    <entry>Topic</entry>
+	  </row>
+	</thead>
+
+	<tbody>
+	  <row>
+	    <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:01.mountd.asc"
+		>SA-11:01.mountd</ulink></entry>
+	    <entry>20&nbsp;April&nbsp;2011</entry>
+	    <entry><para>Network ACL mishandling in &man.mountd.8;</para></entry>
+	  </row>
+
+	  <row>
+	    <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:02.bind.asc"
+		>SA-11:02.bind</ulink></entry>
+	    <entry>28&nbsp;May&nbsp;2011</entry>
+	    <entry><para>BIND remote DoS with large RRSIG RRsets and negative
+		caching</para></entry>
+	  </row>
+
+	  <row>
+	    <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:04.compress.asc"
+		>SA-11:04.compress</ulink></entry>
+	    <entry>28&nbsp;September&nbsp;2011</entry>
+	    <entry><para>Errors handling corrupt compress file in
+		&man.compress.1; and &man.gzip.1;</para></entry>
+	  </row>
+
+	  <row>
+	    <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:05.unix.asc"
+		>SA-11:05.unix</ulink></entry>
+	    <entry>28&nbsp;September&nbsp;2011</entry>
+	    <entry><para>Buffer overflow in handling of UNIX socket
+		addresses</para></entry>
+	  </row>
+
+	  <row>
+	    <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:06.bind.asc"
+		>SA-11:06.bind</ulink></entry>
+	    <entry>23&nbsp;December&nbsp;2011</entry>
+	    <entry><para>Remote packet Denial of Service against &man.named.8;
+		servers</para></entry>
+	  </row>
+
+	  <row>
+	    <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:07.chroot.asc"
+		>SA-11:07.chroot</ulink></entry>
+	    <entry>23&nbsp;December&nbsp;2011</entry>
+	    <entry><para>Code execution via chrooted ftpd</para></entry>
+	  </row>
+
+	  <row>
+	    <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:08.telnetd.asc"
+		>SA-11:08.telnetd</ulink></entry>
+	    <entry>23&nbsp;December&nbsp;2011</entry>
+	    <entry><para>telnetd code execution vulnerability</para></entry>
+	  </row>
+
+	  <row>
+	    <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:09.pam_ssh.asc"
+		>SA-11:09.pam_ssh</ulink></entry>
+	    <entry>23&nbsp;December&nbsp;2011</entry>
+	    <entry><para>pam_ssh improperly grants access when user account has
+		unencrypted SSH private keys</para></entry>
+	  </row>
+
+	  <row>
+	    <entry><ulink url="http://security.freebsd.org/advisories/FreeBSD-SA-11:10.pam.asc"
+		>SA-11:10.pam</ulink></entry>
+	    <entry>23&nbsp;December&nbsp;2011</entry>
+	    <entry><para><function>pam_start()</function> does not validate
+		service names</para></entry>
+	  </row>
+	</tbody>
+      </tgroup>
+    </informaltable>
   </sect1>
 
   <sect1 id="open-issues">


More information about the svn-src-all mailing list