diff --git a/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html b/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html index 19dc044a4f..09197322ca 100644 --- a/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html +++ b/en_US.ISO8859-1/htdocs/releases/10.0R/relnotes.html @@ -1,5 +1,5 @@ -
Copyright © 2013-2014 The FreeBSD Documentation +
Copyright © 2013-2014 The FreeBSD Documentation Project
FreeBSD is a registered trademark of the FreeBSD Foundation.
IBM, AIX, OS/2, PowerPC, PS/2, S/390, and ThinkPad are @@ -52,7 +52,9 @@ advisories available from FreeBSD Security Information.
Advisory | Date | Topic |
---|---|---|
SA-13:14.openssh | 19 November 2013 | OpenSSH AES-GCM memory corruption - vulnerability |
SA-14:01.bsnmpd | 14 January 2014 | bsnmpd remote denial of service vulnerability |
SA-14:02.ntpd | 14 January 2014 | ntpd distributed reflection Denial of Service vulnerability |
SA-14:03.openssl | 14 January 2014 | OpenSSL multiple vulnerabilities |
SA-14:04.bind | 14 January 2014 | BIND remote denial of service vulnerability |
The use of unmapped VMIO buffers + vulnerability
bsnmpd remote denial of service vulnerability
ntpd distributed reflection Denial of Service vulnerability
OpenSSL multiple vulnerabilities
BIND remote denial of service vulnerability
Capsicum has been enabled in the kernel by default, allowing + sandboxing of several programs that work within the + “capabilities mode”.
The use of unmapped VMIO buffers eliminates the need to perform TLB shootdown for mapping on buffer creation and reuse, greatly reducing the amount of IPIs for shootdown on big-SMP machines and eliminating up to 25-30%