From owner-cvs-all@FreeBSD.ORG Sun Jun 12 11:45:14 2005 Return-Path: X-Original-To: cvs-all@FreeBSD.org Delivered-To: cvs-all@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1039316A41C; Sun, 12 Jun 2005 11:45:14 +0000 (GMT) (envelope-from hrs@FreeBSD.org) Received: from mail.allbsd.org (vlsi00.si.noda.tus.ac.jp [133.31.130.32]) by mx1.FreeBSD.org (Postfix) with ESMTP id 68DCF43D1D; Sun, 12 Jun 2005 11:45:13 +0000 (GMT) (envelope-from hrs@FreeBSD.org) Received: from delta.allbsd.org (p19186-adsau12honb8-acca.tokyo.ocn.ne.jp [221.113.175.186]) (authenticated bits=128) by mail.allbsd.org (8.13.1/8.13.1) with ESMTP id j5CBj710019634; Sun, 12 Jun 2005 20:45:11 +0900 (JST) (envelope-from hrs@FreeBSD.org) Received: from localhost (alph.allbsd.org [192.168.0.10]) by delta.allbsd.org (8.13.1/8.13.1) with ESMTP id j5CBikhb086258; Sun, 12 Jun 2005 20:44:47 +0900 (JST) (envelope-from hrs@FreeBSD.org) Date: Sun, 12 Jun 2005 20:41:14 +0900 (JST) Message-Id: <20050612.204114.95014473.hrs@allbsd.org> To: simon@FreeBSD.org From: Hiroki Sato In-Reply-To: <20050612101544.GJ821@zaphod.nitro.dk> References: <200506111727.j5BHRE8S000759@repoman.freebsd.org> <20050612101544.GJ821@zaphod.nitro.dk> X-PGPkey-fingerprint: BDB3 443F A5DD B3D0 A530 FFD7 4F2C D3D8 2793 CF2D X-Mailer: Mew version 4.2 on Emacs 21.3 / Mule 5.0 (SAKAKI) Mime-Version: 1.0 Content-Type: Multipart/Signed; protocol="application/pgp-signature"; micalg=pgp-sha1; boundary="--Security_Multipart0(Sun_Jun_12_20_41_14_2005_294)--" Content-Transfer-Encoding: 7bit X-Virus-Scanned: ClamAV 0.83/927/Sun Jun 12 16:51:54 2005 on gatekeeper.allbsd.org X-Virus-Status: Clean Cc: cvs-src@FreeBSD.org, src-committers@FreeBSD.org, hrs@FreeBSD.org, cvs-all@FreeBSD.org, bmah@FreeBSD.org Subject: Re: cvs commit: src/release/doc/en_US.ISO8859-1/relnotes/common new.sgml X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 12 Jun 2005 11:45:14 -0000 ----Security_Multipart0(Sun_Jun_12_20_41_14_2005_294)-- Content-Type: Multipart/Mixed; boundary="--Next_Part(Sun_Jun_12_20_41_14_2005_225)--" Content-Transfer-Encoding: 7bit ----Next_Part(Sun_Jun_12_20_41_14_2005_225)-- Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit "Simon L. Nielsen" wrote in <20050612101544.GJ821@zaphod.nitro.dk>: si> On 2005.06.11 17:27:14 +0000, Hiroki Sato wrote: si> > hrs 2005-06-11 17:27:14 UTC si> > si> > FreeBSD src repository si> > si> > Modified files: si> > release/doc/en_US.ISO8859-1/relnotes/common new.sgml si> > Log: si> > Document SA-05:10, SA-05:11, and SA-05:12. si> si> So how about the errata documents - should we just change it to the si> brief format we discussed? I tried to make a patch based on Bruce's idea (attached). Simple cut-n-paste from SAs is enough to update this. How about this? We have to add them manually for the time being until we utilize an XML database or so, anyway. -- | Hiroki SATO ----Next_Part(Sun_Jun_12_20_41_14_2005_225)-- Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="errata_RELENG_5.diff" Index: article.sgml =================================================================== RCS file: /home/ncvs/src/release/doc/en_US.ISO8859-1/errata/article.sgml,v retrieving revision 1.69.2.20 diff -d -u -I\$FreeBSD:.*\$ -I\$NetBSD:.*\$ -I\$OpenBSD:.*\$ -I\$DragonFly:.*\$ -I\$Id:.*\$ -I\$Translation:.*\$ -I\$hrs:.*\$ -r1.69.2.20 article.sgml --- article.sgml 23 May 2005 03:35:17 -0000 1.69.2.20 +++ article.sgml 12 Jun 2005 11:41:04 -0000 @@ -94,14 +94,50 @@ Security Advisories - (22 May 2005) An information disclosure vulnerability has - been discovered in processors using Hyper-Threading Technology - (HTT). For more information, as well as a patch that adds a - boot-time tunable variable that disables the use of HTT by - default, consult security advisory - FreeBSD-SA-05:09.htt. - + The following security advisories pertain to &os; &release.bugfix;. + For more information, consult the individual advisories. + + + + + + Advisory + Date + Topic + + + + + + SA-05:09.htt + 22 May 2005 + information disclosure when using HTT + + + SA-05:10.tcpdump + 9 Jun 2005 + Infinite loops in tcpdump protocol decoding + + + + SA-05:11.gzip + 9 Jun 2005 + gzip directory traversal and permission race vulnerabilities + + + + SA-05:12.bind9 + 9 Jun 2005 + BIND 9 DNSSEC remote denial of service vulnerability + + + + ----Next_Part(Sun_Jun_12_20_41_14_2005_225)---- ----Security_Multipart0(Sun_Jun_12_20_41_14_2005_294)-- Content-Type: application/pgp-signature Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (FreeBSD) iD8DBQBCrB9aTyzT2CeTzy0RArLpAJ0Ux4SbSeiDdHGyYKTyixUNzdca0gCeNpQw eWeedMBSeiTWvM991XTr6Pg= =Wat5 -----END PGP SIGNATURE----- ----Security_Multipart0(Sun_Jun_12_20_41_14_2005_294)----