diff --git a/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml b/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml index ec5f5c7b88..998dd7fba5 100644 --- a/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml +++ b/en_US.ISO8859-1/htdocs/news/status/report-2014-07-2014-09.xml @@ -1841,7 +1841,7 @@
The project to update the Intel graphics chipset driver (i915kms) to a recent snapshot of the Linux upstream code - continues. A patch with a large chunk of updates has been + continues. A patch with a large chunk of updates has been made available to check for regressions against current functionality, but is not yet expected to provide fully functional new functionality. The GEM I/O ioctl code path @@ -2038,6 +2038,7 @@
Full support for thin provisioning, including capacity usage reporting and thresholds notifications.
+Inter-host XCOPY operations.
Large page support
SMP support
Debug and cleanup
Security vetting
Performance tweaks
Address Space Layout Randomization (ASLR) is a computer security technique that aids in mitigating low-level - vulnerabilities such as buffer overflows. In order to + vulnerabilities such as buffer overflows. In order to prevent an attacker from knowing where a given exploitable vulnerability lies in memory, ASLR randomizes the memory layout of running applications.
&os; lacks behind the industry in exploit mitigation - technologies. ASLR is a great first step in implementing - such technologies. Future exploit mitigation technologies + technologies. ASLR is a great first step in implementing + such technologies. Future exploit mitigation technologies will rely on ASLR.
-A lot has happened in the last few months. Shawn Webb gave +
A lot has happened in the last few months. Shawn Webb gave presentations at both BSDCan 2014 and EuroBSDCon 2014. The presentations were met with a lot of support and backing. At the end of EuroBSDCon, an awesome developer named Ilya - Bakulin fixed our ARM bug. Shawn Webb and Oliver Pinter + Bakulin fixed our ARM bug. Shawn Webb and Oliver Pinter have submitted our patch to Phabricator, &os;'s new - code review utility. Shawn Webb added an API for allowing + code review utility. Shawn Webb added an API for allowing a debugger to disable ASLR in order to support deterministic debugging with applications such as lldb or - gdb. Oliver Pinter enhanced the performance of our ASLR - implementation. A package building exp-run was ran and came - out favorably in terms of performance. Shawn Webb bumped up + gdb. Oliver Pinter enhanced the performance of our ASLR + implementation. A package building exp-run was ran and came + out favorably in terms of performance. Shawn Webb bumped up the maximum number of bits allowed to be randomized to 20 and set the default to 14.
To aid in the upstreaming process of the ASLR project and other security-related projects, Shawn Webb and Oliver Pinter - founded The HardenedBSD project. It exists primarily to + founded The HardenedBSD project. It exists primarily to serve as a staging area for bleeding-edge development of security-related projects for &os; prior to being merged upstream.
@@ -2174,15 +2179,19 @@Get more people testing and reviewing our patch
Run more performance tests
Figure out why the two ports failed in the EXP-RUN. Involve the port maintainers.
Test on different architectures (we need help with this)
+Test on different architectures (we need help with + this)