svn commit: r43606 - head/en_US.ISO8859-1/htdocs/releases/10.0R

Glen Barber gjb at FreeBSD.org
Tue Jan 21 07:02:45 UTC 2014


Author: gjb
Date: Tue Jan 21 07:02:44 2014
New Revision: 43606
URL: http://svnweb.freebsd.org/changeset/doc/43606

Log:
  Regen after mention of capsicum enabled by default.
  
  Sponsored by:	The FreeBSD Foundation

Modified:
  head/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html

Modified: head/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html	Tue Jan 21 00:46:03 2014	(r43605)
+++ head/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html	Tue Jan 21 07:02:44 2014	(r43606)
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 10.0-RELEASE Release Notes</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="doc at FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="The release notes for FreeBSD 10.0-RELEASE contain a summary of the changes made to the FreeBSD base system on the 10.0-STABLE development line. This document lists applicable security advisories that were issued since the last release, as well as significant changes to the FreeBSD kernel and userland. Some brief remarks on upgrading are also presented." /></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp6
 1503184"></a>FreeBSD 10.0-RELEASE Release Notes</h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">The FreeBSD Project</span></h3></div></div><div><p xmlns="http://www.w3.org/1999/xhtml" class="copyright">Copyright © 2013-2014 The FreeBSD Documentation
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /><title>FreeBSD 10.0-RELEASE Release Notes</title><link rel="stylesheet" type="text/css" href="docbook.css" /><link rev="made" href="doc at FreeBSD.org" /><meta name="generator" content="DocBook XSL Stylesheets V1.78.1" /><meta name="description" content="The release notes for FreeBSD 10.0-RELEASE contain a summary of the changes made to the FreeBSD base system on the 10.0-STABLE development line. This document lists applicable security advisories that were issued since the last release, as well as significant changes to the FreeBSD kernel and userland. Some brief remarks on upgrading are also presented." /></head><body><div class="article"><div xmlns="" class="titlepage"><div><div><h1 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="idp6
 1445840"></a>FreeBSD 10.0-RELEASE Release Notes</h1></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="author"><h3 class="author"><span class="orgname">The FreeBSD Project</span></h3></div></div><div><p xmlns="http://www.w3.org/1999/xhtml" class="copyright">Copyright © 2013-2014 The FreeBSD Documentation
       Project</p></div><div><div xmlns="http://www.w3.org/1999/xhtml" class="legalnotice"><a id="trademarks"></a><p xmlns="http://www.w3.org/TR/xhtml1/transitional">FreeBSD is a registered trademark of
   the FreeBSD Foundation. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">IBM, AIX, OS/2,
   PowerPC, PS/2, S/390, and ThinkPad are
@@ -52,7 +52,9 @@
       advisories available from
       <a xmlns="http://www.w3.org/1999/xhtml" class="link" href="http://security.FreeBSD.org/" target="_top">FreeBSD
 	Security Information</a>. </p><div class="informaltable"><table border="0"><colgroup><col /><col /><col /></colgroup><thead><tr><th>Advisory</th><th>Date</th><th>Topic</th></tr></thead><tbody><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc" target="_top">SA-13:14.openssh</a></td><td>19 November 2013</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">OpenSSH AES-GCM memory corruption
-		vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc" target="_top">SA-14:01.bsnmpd</a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">bsnmpd remote denial of service vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" target="_top">SA-14:02.ntpd</a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">ntpd distributed reflection Denial of Service vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc" target="_top">SA-14:03.openssl</a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">OpenSSL multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc" target="_top">SA-14:04.bind<
 /a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">BIND remote denial of service vulnerability </p></td></tr></tbody></table></div></div><div class="sect2"><div xmlns="" class="titlepage"><div><div><h3 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="kernel"></a>2.2. Kernel Changes</h3></div></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">The use of unmapped VMIO buffers
+		vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc" target="_top">SA-14:01.bsnmpd</a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">bsnmpd remote denial of service vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" target="_top">SA-14:02.ntpd</a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">ntpd distributed reflection Denial of Service vulnerability </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc" target="_top">SA-14:03.openssl</a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">OpenSSL multiple vulnerabilities </p></td></tr><tr><td><a class="link" href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc" target="_top">SA-14:04.bind<
 /a></td><td>14 January 2014</td><td><p xmlns="http://www.w3.org/TR/xhtml1/transitional">BIND remote denial of service vulnerability </p></td></tr></tbody></table></div></div><div class="sect2"><div xmlns="" class="titlepage"><div><div><h3 xmlns="http://www.w3.org/1999/xhtml" class="title"><a id="kernel"></a>2.2. Kernel Changes</h3></div></div></div><p xmlns="http://www.w3.org/TR/xhtml1/transitional">Capsicum has been enabled in the kernel by default, allowing
+      sandboxing of several programs that work within the
+      <span xmlns="http://www.w3.org/1999/xhtml" class="quote">“<span class="quote">capabilities mode</span>”</span>. </p><p xmlns="http://www.w3.org/TR/xhtml1/transitional">The use of unmapped VMIO buffers
       eliminates the need to perform TLB shootdown for mapping on
       buffer creation and reuse, greatly reducing the amount of IPIs
       for shootdown on big-SMP machines and eliminating up to 25-30%


More information about the svn-doc-all mailing list