diff options
author | Renato Botelho <renato@netgate.com> | 2016-01-15 08:36:46 -0200 |
---|---|---|
committer | Renato Botelho <renato@netgate.com> | 2016-01-15 08:36:46 -0200 |
commit | 5118afa75776a41209a94f4a4ddf7c3164fac0df (patch) | |
tree | a899f605d0f0d9be1fb44d7a8d643a1233065dda /release | |
parent | 58b7eab7d39d983cc70f6f1d611f00470a76fca1 (diff) | |
parent | ce58d6dbf38815b68dedcf0559779e5ceb149a0d (diff) | |
download | FreeBSD-src-5118afa75776a41209a94f4a4ddf7c3164fac0df.zip FreeBSD-src-5118afa75776a41209a94f4a4ddf7c3164fac0df.tar.gz |
Merge remote-tracking branch 'origin/stable/10' into devel
Diffstat (limited to 'release')
-rw-r--r-- | release/doc/share/xml/security.xml | 20 |
1 files changed, 14 insertions, 6 deletions
diff --git a/release/doc/share/xml/security.xml b/release/doc/share/xml/security.xml index 8bd3cbe..fc05ae1 100644 --- a/release/doc/share/xml/security.xml +++ b/release/doc/share/xml/security.xml @@ -57,14 +57,14 @@ <row> <entry><link xlink:href="&security.url;/FreeBSD-SA-16:01.sctp.asc">FreeBSD-SA-16:01.sctp</link></entry> - <entry>15 January 2016</entry> + <entry>14 January 2016</entry> <entry><para>ICMPv6 error message vulnerability</para></entry> </row> <row> <entry><link xlink:href="&security.url;/FreeBSD-SA-16:02.ntp.asc">FreeBSD-SA-16:02.ntp</link></entry> - <entry>15 January 2016</entry> + <entry>14 January 2016</entry> <entry><para>Panic threshold bypass vulnerability</para></entry> </row> @@ -72,7 +72,7 @@ <row> <entry><link xlink:href="&security.url;/FreeBSD-SA-16:03.linux.asc">FreeBSD-SA-16:03.linux</link></entry> - <entry>15 January 2016</entry> + <entry>14 January 2016</entry> <entry><para>Incorrect <literal>futex</literal> handling</para></entry> </row> @@ -80,7 +80,7 @@ <row> <entry><link xlink:href="&security.url;/FreeBSD-SA-16:04.linux.asc">FreeBSD-SA-16:04.linux</link></entry> - <entry>15 January 2016</entry> + <entry>14 January 2016</entry> <entry><para>&man.setgroups.2; system call vulnerability</para></entry> </row> @@ -88,17 +88,25 @@ <row> <entry><link xlink:href="&security.url;/FreeBSD-SA-16:05.tcp.asc">FreeBSD-SA-16:05.tcp</link></entry> - <entry>15 January 2016</entry> + <entry>14 January 2016</entry> <entry><para>MD5 signature denial of service</para></entry> </row> <row> <entry><link xlink:href="&security.url;/FreeBSD-SA-16:06.bsnmpd.asc">FreeBSD-SA-16:06.bsnmpd</link></entry> - <entry>15 January 2016</entry> + <entry>14 January 2016</entry> <entry><para>Insecure default configuration file permissions</para></entry> </row> + + <row> + <entry><link + xlink:href="&security.url;/FreeBSD-SA-16:07.openssh.asc">FreeBSD-SA-16:07.openssh</link></entry> + <entry>14 January 2016</entry> + <entry><para><application>OpenSSH</application> client + information leak</para></entry> + </row> </tbody> </tgroup> </informaltable> |