aboutsummaryrefslogtreecommitdiff
path: root/website/static/security/advisory-template.txt
diff options
context:
space:
mode:
Diffstat (limited to 'website/static/security/advisory-template.txt')
-rw-r--r--website/static/security/advisory-template.txt47
1 files changed, 17 insertions, 30 deletions
diff --git a/website/static/security/advisory-template.txt b/website/static/security/advisory-template.txt
index ef97d0d420..5815e7efb3 100644
--- a/website/static/security/advisory-template.txt
+++ b/website/static/security/advisory-template.txt
@@ -6,16 +6,16 @@ Topic:
Category: < core | contrib >
Module: <module name>
-Announced: 2021-XX-XX
+Announced: 2024-XX-XX
Credits:
Affects: <affected versions>
<e.g., "All supported versions of FreeBSD.", "FreeBSD
- 13.0 and later.", "FreeBSD 12.x", or "FreeBSD 12.2">
-Corrected: 2021-XX-XX XX:XX:XX UTC (stable/13, 13.0-STABLE)
- 2021-XX-XX XX:XX:XX UTC (releng/13.0, 13.0-RELEASE-pXX)
- 2021-XX-XX XX:XX:XX UTC (stable/12, 12.3-STABLE)
- 2021-XX-XX XX:XX:XX UTC (releng/12.3, 12.3-BETAX)
- 2021-XX-XX XX:XX:XX UTC (releng/12.2, 12.2-RELEASE-pXX)
+ 13.2 and later.", "FreeBSD 13.x", or "FreeBSD 14.0">
+Corrected: 2024-XX-XX XX:XX:XX UTC (stable/14, 14.0-STABLE)
+ 2024-XX-XX XX:XX:XX UTC (releng/14.0, 14.0-RELEASE-pXX)
+ 2024-XX-XX XX:XX:XX UTC (stable/13, 13.3-STABLE)
+ 2024-XX-XX XX:XX:XX UTC (releng/13.3, 13.3-RELEASE-pXX)
+ 2024-XX-XX XX:XX:XX UTC (releng/13.2, 13.2-RELEASE-pXX)
CVE Name: CVE-XXXX-XXXX
For general information regarding FreeBSD Security Advisories,
@@ -58,9 +58,9 @@ Perform one of the following:
1) To update your vulnerable system via a binary patch:
-Systems running a RELEASE version of FreeBSD on the amd64, i386, or
-(on FreeBSD 13 and later) arm64 platforms can be updated via the
-freebsd-update(8) utility:
+Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
+or the i386 platform on FreeBSD 13, can be updated via the freebsd-update(8)
+utility:
# freebsd-update fetch
# freebsd-update install
@@ -74,7 +74,7 @@ FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
-[FreeBSD 12.2]
+[FreeBSD 13.2]
# fetch https://security.FreeBSD.org/patches/SA-XX:XX/XXXX.patch
# fetch https://security.FreeBSD.org/patches/SA-XX:XX/XXXX.patch.asc
# gpg --verify XXXX.patch.asc
@@ -111,20 +111,18 @@ system.
VI. Correction details
-This issue is corrected by the corresponding Git commit hash or Subversion
-revision number in the following stable and release branches:
+This issue is corrected as of the corresponding Git commit hash in the
+following stable and release branches:
Branch/path Hash Revision
-------------------------------------------------------------------------
+stable/14/ XXXXXXXXXXXX stable/14-nXXXXXX
+releng/14.0/ XXXXXXXXXXXX releng/14.0-nXXXXXX
stable/13/ XXXXXXXXXXXX stable/13-nXXXXXX
-releng/13.0/ XXXXXXXXXXXX releng/13.0-nXXXXXX
-stable/12/ rXXXXXX
-releng/12.3/ rXXXXXX
-releng/12.2/ rXXXXXX
+releng/13.3/ XXXXXXXXXXXX releng/13.3-nXXXXXX
+releng/13.2/ XXXXXXXXXXXX releng/13.2-nXXXXXX
-------------------------------------------------------------------------
-For FreeBSD 13 and later:
-
Run the following command to see which files were modified by a
particular commit:
@@ -139,17 +137,6 @@ nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
-For FreeBSD 12 and earlier:
-
-Run the following command to see which files were modified by a particular
-revision, replacing NNNNNN with the revision number:
-
-# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
-
-Or visit the following URL, replacing NNNNNN with the revision number:
-
-<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
-
VII. References
<other info on vulnerability>