diff options
Diffstat (limited to 'website/static/security/advisory-template.txt')
-rw-r--r-- | website/static/security/advisory-template.txt | 47 |
1 files changed, 17 insertions, 30 deletions
diff --git a/website/static/security/advisory-template.txt b/website/static/security/advisory-template.txt index ef97d0d420..5815e7efb3 100644 --- a/website/static/security/advisory-template.txt +++ b/website/static/security/advisory-template.txt @@ -6,16 +6,16 @@ Topic: Category: < core | contrib > Module: <module name> -Announced: 2021-XX-XX +Announced: 2024-XX-XX Credits: Affects: <affected versions> <e.g., "All supported versions of FreeBSD.", "FreeBSD - 13.0 and later.", "FreeBSD 12.x", or "FreeBSD 12.2"> -Corrected: 2021-XX-XX XX:XX:XX UTC (stable/13, 13.0-STABLE) - 2021-XX-XX XX:XX:XX UTC (releng/13.0, 13.0-RELEASE-pXX) - 2021-XX-XX XX:XX:XX UTC (stable/12, 12.3-STABLE) - 2021-XX-XX XX:XX:XX UTC (releng/12.3, 12.3-BETAX) - 2021-XX-XX XX:XX:XX UTC (releng/12.2, 12.2-RELEASE-pXX) + 13.2 and later.", "FreeBSD 13.x", or "FreeBSD 14.0"> +Corrected: 2024-XX-XX XX:XX:XX UTC (stable/14, 14.0-STABLE) + 2024-XX-XX XX:XX:XX UTC (releng/14.0, 14.0-RELEASE-pXX) + 2024-XX-XX XX:XX:XX UTC (stable/13, 13.3-STABLE) + 2024-XX-XX XX:XX:XX UTC (releng/13.3, 13.3-RELEASE-pXX) + 2024-XX-XX XX:XX:XX UTC (releng/13.2, 13.2-RELEASE-pXX) CVE Name: CVE-XXXX-XXXX For general information regarding FreeBSD Security Advisories, @@ -58,9 +58,9 @@ Perform one of the following: 1) To update your vulnerable system via a binary patch: -Systems running a RELEASE version of FreeBSD on the amd64, i386, or -(on FreeBSD 13 and later) arm64 platforms can be updated via the -freebsd-update(8) utility: +Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, +or the i386 platform on FreeBSD 13, can be updated via the freebsd-update(8) +utility: # freebsd-update fetch # freebsd-update install @@ -74,7 +74,7 @@ FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. -[FreeBSD 12.2] +[FreeBSD 13.2] # fetch https://security.FreeBSD.org/patches/SA-XX:XX/XXXX.patch # fetch https://security.FreeBSD.org/patches/SA-XX:XX/XXXX.patch.asc # gpg --verify XXXX.patch.asc @@ -111,20 +111,18 @@ system. VI. Correction details -This issue is corrected by the corresponding Git commit hash or Subversion -revision number in the following stable and release branches: +This issue is corrected as of the corresponding Git commit hash in the +following stable and release branches: Branch/path Hash Revision ------------------------------------------------------------------------- +stable/14/ XXXXXXXXXXXX stable/14-nXXXXXX +releng/14.0/ XXXXXXXXXXXX releng/14.0-nXXXXXX stable/13/ XXXXXXXXXXXX stable/13-nXXXXXX -releng/13.0/ XXXXXXXXXXXX releng/13.0-nXXXXXX -stable/12/ rXXXXXX -releng/12.3/ rXXXXXX -releng/12.2/ rXXXXXX +releng/13.3/ XXXXXXXXXXXX releng/13.3-nXXXXXX +releng/13.2/ XXXXXXXXXXXX releng/13.2-nXXXXXX ------------------------------------------------------------------------- -For FreeBSD 13 and later: - Run the following command to see which files were modified by a particular commit: @@ -139,17 +137,6 @@ nNNNNNN in the table above), run: # git rev-list --count --first-parent HEAD -For FreeBSD 12 and earlier: - -Run the following command to see which files were modified by a particular -revision, replacing NNNNNN with the revision number: - -# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base - -Or visit the following URL, replacing NNNNNN with the revision number: - -<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> - VII. References <other info on vulnerability> |