svn commit: r43524 - head/en_US.ISO8859-1/htdocs/releases/10.0R
Glen Barber
gjb at FreeBSD.org
Tue Jan 14 21:29:02 UTC 2014
Author: gjb
Date: Tue Jan 14 21:29:02 2014
New Revision: 43524
URL: http://svnweb.freebsd.org/changeset/doc/43524
Log:
Regen after r260649.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
Modified:
head/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html
Modified: head/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html Tue Jan 14 20:41:24 2014 (r43523)
+++ head/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html Tue Jan 14 21:29:02 2014 (r43524)
@@ -18,7 +18,7 @@
as trademarks. Where those designations appear in this document,
and the FreeBSD Project was aware of the trademark claim, the
designations have been followed by the <span class="quote">“<span class="quote">™</span>”</span> or the
- <span class="quote">“<span class="quote">®</span>”</span> symbol.</p></div></div><div>Last modified on 2014-01-14 by gjb.</div><div><div xmlns="http://www.w3.org/1999/xhtml" class="abstract"><div class="abstract-title">Abstract</div><p>The release notes for FreeBSD 10.0-RELEASE contain
+ <span class="quote">“<span class="quote">®</span>”</span> symbol.</p></div></div><div>Last modified on 2014-01-14 by delphij.</div><div><div xmlns="http://www.w3.org/1999/xhtml" class="abstract"><div class="abstract-title">Abstract</div><p>The release notes for FreeBSD 10.0-RELEASE contain
a summary of the changes made to the FreeBSD base system on the
10.0-STABLE development line. This document lists
applicable security advisories that were issued since the last
@@ -49,7 +49,12 @@
release engineering practices. Clearly the release notes cannot
list every single change made to FreeBSD between releases; this
document focuses primarily on security advisories, user-visible
- changes, and major architectural improvements.</p><div class="sect2"><div xmlns="" class="titlepage"><div><div><h3 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="security"></a>2.1. Security Advisories</h3></div></div></div><p>No security advisories.</p></div><div class="sect2"><div xmlns="" class="titlepage"><div><div><h3 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="kernel"></a>2.2. Kernel Changes</h3></div></div></div><p>The use of unmapped VMIO buffers
+ changes, and major architectural improvements.</p><div class="sect2"><div xmlns="" class="titlepage"><div><div><h3 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="security"></a>2.1. Security Advisories</h3></div></div></div><p>Problems described in the following security advisories have
+ been fixed. For more information, consult the individual
+ advisories available from
+ <a class="link" href="http://security.FreeBSD.org/" target="_top">FreeBSD
+ Security Information</a>.</p><div class="informaltable"><table border="0"><colgroup><col /><col /><col /></colgroup><thead><tr><th>Advisory</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc" target="_top">SA-13:14.openssh</a></td><td>19 November 2013</td><td><p>OpenSSH AES-GCM memory corruption
+ vulnerability</p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc" target="_top">SA-14:01.bsnmpd</a></td><td>14 January 2014</td><td><p>bsnmpd remote denial of service vulnerability</p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" target="_top">SA-14:02.ntpd</a></td><td>14 January 2014</td><td><p>ntpd distributed reflection Denial of Service vulnerability</p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc" target="_top">SA-14:03.openssl</a></td><td>14 January 2014</td><td><p>OpenSSL multiple vulnerabilities</p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc" target="_top">SA-14:04.bind</a></td><td>14 January 2014</td><td><p>BIND remote denial of service vulnerability</p></td></tr></tbody></table></div></div><div class="sect2"><div xml
ns="" class="titlepage"><div><div><h3 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="kernel"></a>2.2. Kernel Changes</h3></div></div></div><p>The use of unmapped VMIO buffers
eliminates the need to perform TLB shootdown for mapping on
buffer creation and reuse, greatly reducing the amount of IPIs
for shootdown on big-SMP machines and eliminating up to 25-30%
More information about the svn-doc-all
mailing list