Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 15 Jan 2016 05:38:27 +0000 (UTC)
From:      Glen Barber <gjb@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-stable@freebsd.org, svn-src-stable-9@freebsd.org
Subject:   svn commit: r294071 - in stable: 10/release/doc/share/xml 9/release/doc/share/xml
Message-ID:  <201601150538.u0F5cR6e099357@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: gjb
Date: Fri Jan 15 05:38:27 2016
New Revision: 294071
URL: https://svnweb.freebsd.org/changeset/base/294071

Log:
  Fix dates for previous errata update.
  
  Sponsored by:	The FreeBSD Foundation

Modified:
  stable/9/release/doc/share/xml/security.xml

Changes in other areas also in this revision:
Modified:
  stable/10/release/doc/share/xml/security.xml

Modified: stable/9/release/doc/share/xml/security.xml
==============================================================================
--- stable/9/release/doc/share/xml/security.xml	Fri Jan 15 04:05:56 2016	(r294070)
+++ stable/9/release/doc/share/xml/security.xml	Fri Jan 15 05:38:27 2016	(r294071)
@@ -263,14 +263,14 @@
       <row>
 	<entry><link
 	    xlink:href="&security.url;/FreeBSD-SA-16:01.sctp.asc">FreeBSD-SA-16:01.sctp</link></entry>
-	<entry>15&nbsp;January&nbsp;2016</entry>
+	<entry>14&nbsp;January&nbsp;2016</entry>
 	<entry><para>ICMPv6 error message vulnerability</para></entry>
       </row>
 
       <row>
 	<entry><link
 	    xlink:href="&security.url;/FreeBSD-SA-16:02.ntp.asc">FreeBSD-SA-16:02.ntp</link></entry>
-	<entry>15&nbsp;January&nbsp;2016</entry>
+	<entry>14&nbsp;January&nbsp;2016</entry>
 	<entry><para>Panic threshold bypass
 	    vulnerability</para></entry>
       </row>
@@ -278,7 +278,7 @@
       <row>
 	<entry><link
 	    xlink:href="&security.url;/FreeBSD-SA-16:03.linux.asc">FreeBSD-SA-16:03.linux</link></entry>
-	<entry>15&nbsp;January&nbsp;2016</entry>
+	<entry>14&nbsp;January&nbsp;2016</entry>
 	<entry><para>Incorrect <literal>futex</literal>
 	    handling</para></entry>
       </row>
@@ -286,7 +286,7 @@
       <row>
 	<entry><link
 	    xlink:href="&security.url;/FreeBSD-SA-16:04.linux.asc">FreeBSD-SA-16:04.linux</link></entry>
-	<entry>15&nbsp;January&nbsp;2016</entry>
+	<entry>14&nbsp;January&nbsp;2016</entry>
 	<entry><para>&man.setgroups.2; system call
 	    vulnerability</para></entry>
       </row>
@@ -294,14 +294,14 @@
       <row>
 	<entry><link
 	    xlink:href="&security.url;/FreeBSD-SA-16:05.tcp.asc">FreeBSD-SA-16:05.tcp</link></entry>
-	<entry>15&nbsp;January&nbsp;2016</entry>
+	<entry>14&nbsp;January&nbsp;2016</entry>
 	<entry><para>MD5 signature denial of service</para></entry>
       </row>
 
       <row>
 	<entry><link
 	    xlink:href="&security.url;/FreeBSD-SA-16:06.bsnmpd.asc">FreeBSD-SA-16:06.bsnmpd</link></entry>
-	<entry>15&nbsp;January&nbsp;2016</entry>
+	<entry>14&nbsp;January&nbsp;2016</entry>
 	<entry><para>Insecure default configuration file
 	  permissions</para></entry>
       </row>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201601150538.u0F5cR6e099357>