From owner-svn-src-all@FreeBSD.ORG Fri Oct 17 16:02:35 2014 Return-Path: Delivered-To: svn-src-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 372CE90A; Fri, 17 Oct 2014 16:02:35 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 21DBFAF8; Fri, 17 Oct 2014 16:02:35 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9HG2Y82027738; Fri, 17 Oct 2014 16:02:34 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9HG2YQQ027737; Fri, 17 Oct 2014 16:02:34 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201410171602.s9HG2YQQ027737@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Fri, 17 Oct 2014 16:02:34 +0000 (UTC) To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-releng@freebsd.org Subject: svn commit: r273231 - releng/10.1/release/doc/en_US.ISO8859-1/relnotes X-SVN-Group: releng MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-all@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "SVN commit messages for the entire src tree \(except for " user" and " projects" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Oct 2014 16:02:35 -0000 Author: gjb Date: Fri Oct 17 16:02:34 2014 New Revision: 273231 URL: https://svnweb.freebsd.org/changeset/base/273231 Log: Fill in the security advisories section. Approved by: re (implicit) Sponsored by: The FreeBSD Foundation Modified: releng/10.1/release/doc/en_US.ISO8859-1/relnotes/article.xml Modified: releng/10.1/release/doc/en_US.ISO8859-1/relnotes/article.xml ============================================================================== --- releng/10.1/release/doc/en_US.ISO8859-1/relnotes/article.xml Fri Oct 17 15:37:48 2014 (r273230) +++ releng/10.1/release/doc/en_US.ISO8859-1/relnotes/article.xml Fri Oct 17 16:02:34 2014 (r273231) @@ -123,7 +123,173 @@ Security Advisories -   + The following security advisories have been issued since + &os; &release.prev;: + + + + + + + + + Advisory + Date + Topic + + + + + + SA-13:14.openssh + 19 November 2013 + OpenSSH AES-GCM memory corruption + vulnerability + + + + SA-14:01.bsnmpd + 14 January 2014 + bsnmpd remote denial of service + vulnerability + + + + SA-14:02.ntpd + 14 January 2014 + ntpd distributed reflection Denial of + Service vulnerability + + + + SA-14:03.openssl + 14 January 2014 + OpenSSL multiple + vulnerabilities + + + + SA-14:04.bind + 14 January 2014 + BIND remote denial of service + vulnerability + + + + SA-14:05.nfsserver + 8 April 2014 + Deadlock in the NFS server + + + + SA-14:06.openssl + 8 April 2014 + OpenSSL multiple + vulnerabilities + + + + SA-14:07.devfs + 30 April 2014 + Fix devfs rules not applied by default for + jails + + + + SA-14:08.tcp + 30 April 2014 + Fix TCP reassembly + vulnerability + + + + SA-14:09.openssl + 30 April 2014 + Fix OpenSSL use-after-free + vulnerability + + + + SA-14:10.openssl + 15 May 2014 + Fix OpenSSL NULL pointer deference + vulnerability + + + + SA-14:11.sendmail + 3 June 2014 + Fix sendmail improper close-on-exec flag + handling + + + + SA-14:13.pam + 3 June 2014 + Fix incorrect error handling in PAM policy + parser + + + + SA-14:14.openssl + 5 June 2014 + Multiple vulnerabilities + + + + SA-14:15.iconv + 24 June 2014 + NULL pointer dereference and out-of-bounds + array access + + + + SA-14:16.file + 24 June 2014 + Multiple vulnerabilities + + + + SA-14:17.kmem + 8 July 2014 + Kernel memory disclosure in control + messages and SCTP notifications + + + + SA-14:18.openssl + 9 September 2014 + Multiple vulnerabilities + + + + SA-14:19.tcp + 16 September 2014 + Denial of Service in TCP packet + processing. + + + +