From 1b1ecbf017e78b785223020ca535247cc89fcf79 Mon Sep 17 00:00:00 2001 From: Glen Barber Date: Tue, 14 Jan 2014 21:29:02 +0000 Subject: [PATCH] Regen after r260649. Approved by: re (implicit) Sponsored by: The FreeBSD Foundation --- en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html b/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html index bb62384895..18247b125a 100644 --- a/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html +++ b/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html @@ -18,7 +18,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

Last modified on 2014-01-14 by gjb.
Abstract

The release notes for FreeBSD 10.0-RELEASE contain + ® symbol.

Last modified on 2014-01-14 by delphij.
Abstract

The release notes for FreeBSD 10.0-RELEASE contain a summary of the changes made to the FreeBSD base system on the 10.0-STABLE development line. This document lists applicable security advisories that were issued since the last @@ -49,7 +49,12 @@ release engineering practices. Clearly the release notes cannot list every single change made to FreeBSD between releases; this document focuses primarily on security advisories, user-visible - changes, and major architectural improvements.

2.1. Security Advisories

No security advisories.

2.2. Kernel Changes

The use of unmapped VMIO buffers + changes, and major architectural improvements.

2.1. Security Advisories

Problems described in the following security advisories have + been fixed. For more information, consult the individual + advisories available from + FreeBSD + Security Information.

AdvisoryDateTopic
SA-13:14.openssh19 November 2013

OpenSSH AES-GCM memory corruption + vulnerability

SA-14:01.bsnmpd14 January 2014

bsnmpd remote denial of service vulnerability

SA-14:02.ntpd14 January 2014

ntpd distributed reflection Denial of Service vulnerability

SA-14:03.openssl14 January 2014

OpenSSL multiple vulnerabilities

SA-14:04.bind14 January 2014

BIND remote denial of service vulnerability

2.2. Kernel Changes

The use of unmapped VMIO buffers eliminates the need to perform TLB shootdown for mapping on buffer creation and reuse, greatly reducing the amount of IPIs for shootdown on big-SMP machines and eliminating up to 25-30%