Date: Tue, 14 Jan 2014 21:06:44 +0000 (UTC) From: Xin LI <delphij@FreeBSD.org> To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-releng@freebsd.org Subject: svn commit: r260649 - releng/10.0/release/doc/en_US.ISO8859-1/relnotes Message-ID: <201401142106.s0EL6iGS063846@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: delphij Date: Tue Jan 14 21:06:44 2014 New Revision: 260649 URL: http://svnweb.freebsd.org/changeset/base/260649 Log: Document recent security advisories (since 9.2-RELEASE is released). Approved by: re (gjb) Modified: releng/10.0/release/doc/en_US.ISO8859-1/relnotes/article.xml Modified: releng/10.0/release/doc/en_US.ISO8859-1/relnotes/article.xml ============================================================================== --- releng/10.0/release/doc/en_US.ISO8859-1/relnotes/article.xml Tue Jan 14 20:18:38 2014 (r260648) +++ releng/10.0/release/doc/en_US.ISO8859-1/relnotes/article.xml Tue Jan 14 21:06:44 2014 (r260649) @@ -132,7 +132,65 @@ <sect2 xml:id="security"> <title>Security Advisories</title> - <para>No security advisories.</para> + <para>Problems described in the following security advisories have + been fixed. For more information, consult the individual + advisories available from + <link xlink:href="http://security.FreeBSD.org/">FreeBSD + Security Information</link>.</para> + + <informaltable frame="none" pgwide="0"> + <tgroup cols="3"> + <colspec colwidth="1*" /> + <colspec colwidth="1*" /> + <colspec colwidth="3*" /> + <thead> + <row> + <entry>Advisory</entry> + <entry>Date</entry> + <entry>Topic</entry> + </row> + </thead> + + <tbody> + <row> + <entry><link + xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc">SA-13:14.openssh</link></entry> + <entry>19 November 2013</entry> + <entry><para>OpenSSH AES-GCM memory corruption + vulnerability</para></entry> + </row> + + <row> + <entry><link + xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc">SA-14:01.bsnmpd</link></entry> + <entry>14 January 2014</entry> + <entry><para>bsnmpd remote denial of service vulnerability</para></entry> + </row> + + <row> + <entry><link + xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc">SA-14:02.ntpd</link></entry> + <entry>14 January 2014</entry> + <entry><para>ntpd distributed reflection Denial of Service vulnerability</para></entry> + </row> + + <row> + <entry><link + xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc">SA-14:03.openssl</link></entry> + <entry>14 January 2014</entry> + <entry><para>OpenSSL multiple vulnerabilities</para></entry> + </row> + + <row> + <entry><link + xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc">SA-14:04.bind</link></entry> + <entry>14 January 2014</entry> + <entry><para>BIND remote denial of service vulnerability</para></entry> + </row> + + </tbody> + </tgroup> + </informaltable> </sect2> <sect2 xml:id="kernel">
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201401142106.s0EL6iGS063846>