Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 7 Mar 2016 10:59:28 +0000 (UTC)
From:      Hiroki Sato <hrs@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-stable@freebsd.org, svn-src-stable-10@freebsd.org
Subject:   svn commit: r296451 - stable/10/release/doc/share/xml
Message-ID:  <201603071059.u27AxSlT082201@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: hrs
Date: Mon Mar  7 10:59:28 2016
New Revision: 296451
URL: https://svnweb.freebsd.org/changeset/base/296451

Log:
  Trim old entries.

Modified:
  stable/10/release/doc/share/xml/errata.xml
  stable/10/release/doc/share/xml/security.xml

Modified: stable/10/release/doc/share/xml/errata.xml
==============================================================================
--- stable/10/release/doc/share/xml/errata.xml	Mon Mar  7 10:56:38 2016	(r296450)
+++ stable/10/release/doc/share/xml/errata.xml	Mon Mar  7 10:59:28 2016	(r296451)
@@ -19,98 +19,7 @@
 
     <tbody>
       <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-15:11.toolchain.asc">FreeBSD-EN-15:11.toolchain</link></entry>
-	<entry>18&nbsp;August&nbsp;2015</entry>
-	<entry><para>Fix &man.make.1; syntax errors when upgrading
-	    from &os;&nbsp;9.x and earlier.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-15:12.netstat.asc">FreeBSD-EN-15:12.netstat</link></entry>
-	<entry>18&nbsp;August&nbsp;2015</entry>
-	<entry><para>Fix incorrect &man.netstat.1; data handling on
-	    32-bit systems.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-15:13.vidcontrol.asc">FreeBSD-EN-15:13.vidcontrol</link></entry>
-	<entry>18&nbsp;August&nbsp;2015</entry>
-	<entry><para>Allow size argument to &man.vidcontrol.1; for
-	    &man.syscons.4;.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-15:15.pkg.asc">FreeBSD-EN-15:15.pkg</link></entry>
-	<entry>25&nbsp;August&nbsp;2015</entry>
-	<entry><para>Insufficient check of supported &man.pkg.7;
-	  signature methods.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-15:16.pw.asc">FreeBSD-EN-15:16.pw</link></entry>
-	<entry>16&nbsp;September&nbsp;2015</entry>
-	<entry><para>Fix &man.pw.8; regression when creating numeric
-	    users or groups.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-15:17.libc.asc">FreeBSD-EN-15:17.libc</link></entry>
-	<entry>16&nbsp;September&nbsp;2015</entry>
-	<entry><para>Fix libc handling of signals for multi-threaded
-	    processes.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-15:18.pkg.asc">FreeBSD-EN-15:18.pkg</link></entry>
-	<entry>16&nbsp;September&nbsp;2015</entry>
-	<entry><para>Implement <literal>pubkey</literal> support for
-	    &man.pkg.7; bootstrap.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-15:19.kqueue.asc">FreeBSD-EN-15:19.kqueue</link></entry>
-	<entry>4&nbsp;November&nbsp;2015</entry>
-	<entry><para>&man.kqueue.2; write events never fire for files
-	    larger than 2GB.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-15:20.vm.asc">FreeBSD-EN-15:20.vm</link></entry>
-	<entry>4&nbsp;November&nbsp;2015</entry>
-	<entry><para>Applications exiting due to segmentation
-	    violation on a correct memory address.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:01.filemon.asc">FreeBSD-EN-16:01.filemon</link></entry>
-	<entry>14&nbsp;January&nbsp;2016</entry>
-	<entry><para><application>bmake</application> and
-	    &man.filemon.4; stability issues.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:02.pf.asc">FreeBSD-EN-16:02.pf</link></entry>
-	<entry>14&nbsp;January&nbsp;2016</entry>
-	<entry><para>Invalid TCP checksum issue.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-EN-16:03.yplib.asc">FreeBSD-EN-16:03.yplib</link></entry>
-	<entry>14&nbsp;January&nbsp;2016</entry>
-	<entry><para><application>YP/NIS</application> library
-	    bug.</para></entry>
+	<entry><para></para></entry>
       </row>
     </tbody>
   </tgroup>

Modified: stable/10/release/doc/share/xml/security.xml
==============================================================================
--- stable/10/release/doc/share/xml/security.xml	Mon Mar  7 10:56:38 2016	(r296450)
+++ stable/10/release/doc/share/xml/security.xml	Mon Mar  7 10:59:28 2016	(r296451)
@@ -19,116 +19,7 @@
 
     <tbody>
       <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-15:20.expat.asc">FreeBSD-SA-15:20.expat</link></entry>
-	<entry>18&nbsp;August&nbsp;2015</entry>
-	<entry><para>Fix multiple integer overflows in
-	    &man.libbsdxml.3;.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-15:22.openssh.asc">FreeBSD-SA-15:22.openssh</link></entry>
-	<entry>25&nbsp;August&nbsp;2015</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-15:24.rpcbind.asc">FreeBSD-SA-15:24.rpcbind</link></entry>
-	<entry>29&nbsp;September&nbsp;2015</entry>
-	<entry><para>Remote denial of service</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-15:25.ntp.asc">FreeBSD-SA-15:25.ntp</link></entry>
-	<entry>26&nbsp;October&nbsp;2015</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-15:26.openssl.asc">FreeBSD-SA-15:26.openssl</link></entry>
-	<entry>5&nbsp;December&nbsp;2015</entry>
-	<entry><para>Multiple vulnerabilities</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:01.sctp.asc">FreeBSD-SA-16:01.sctp</link></entry>
-	<entry>14&nbsp;January&nbsp;2016</entry>
-	<entry><para>ICMPv6 error message vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:02.ntp.asc">FreeBSD-SA-16:02.ntp</link></entry>
-	<entry>14&nbsp;January&nbsp;2016</entry>
-	<entry><para>Panic threshold bypass
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:03.linux.asc">FreeBSD-SA-16:03.linux</link></entry>
-	<entry>14&nbsp;January&nbsp;2016</entry>
-	<entry><para>Incorrect <literal>futex</literal>
-	    handling</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:04.linux.asc">FreeBSD-SA-16:04.linux</link></entry>
-	<entry>14&nbsp;January&nbsp;2016</entry>
-	<entry><para>&man.setgroups.2; system call
-	    vulnerability</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:05.tcp.asc">FreeBSD-SA-16:05.tcp</link></entry>
-	<entry>14&nbsp;January&nbsp;2016</entry>
-	<entry><para>MD5 signature denial of service</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:06.bsnmpd.asc">FreeBSD-SA-16:06.bsnmpd</link></entry>
-	<entry>14&nbsp;January&nbsp;2016</entry>
-	<entry><para>Insecure default configuration file
-	  permissions</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:07.openssh.asc">FreeBSD-SA-16:07.openssh</link></entry>
-	<entry>14&nbsp;January&nbsp;2016</entry>
-	<entry><para><application>OpenSSH</application> client
-	    information leak</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:09.ntp.asc">FreeBSD-SA-16:09.ntp</link></entry>
-	<entry>27&nbsp;January&nbsp;2016</entry>
-	<entry><para>Multiple vulnerabilities.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:10.linux.asc">FreeBSD-SA-16:10.linux</link></entry>
-	<entry>27&nbsp;January&nbsp;2016</entry>
-	<entry><para>&man.issetugid.2; system call
-	    vulnerability.</para></entry>
-      </row>
-
-      <row>
-	<entry><link
-	    xlink:href="&security.url;/FreeBSD-SA-16:11.openssl.asc">FreeBSD-SA-16:11.openssl</link></entry>
-	<entry>30&nbsp;January&nbsp;2016</entry>
-	<entry><para>SSLv2 cipher suite downgrade
-	    vulnerability.</para></entry>
+	<entry><para></para></entry>
       </row>
     </tbody>
   </tgroup>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201603071059.u27AxSlT082201>