Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 14 Jan 2014 21:06:44 +0000 (UTC)
From:      Xin LI <delphij@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-releng@freebsd.org
Subject:   svn commit: r260649 - releng/10.0/release/doc/en_US.ISO8859-1/relnotes
Message-ID:  <201401142106.s0EL6iGS063846@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: delphij
Date: Tue Jan 14 21:06:44 2014
New Revision: 260649
URL: http://svnweb.freebsd.org/changeset/base/260649

Log:
  Document recent security advisories (since 9.2-RELEASE is released).
  
  Approved by:	re (gjb)

Modified:
  releng/10.0/release/doc/en_US.ISO8859-1/relnotes/article.xml

Modified: releng/10.0/release/doc/en_US.ISO8859-1/relnotes/article.xml
==============================================================================
--- releng/10.0/release/doc/en_US.ISO8859-1/relnotes/article.xml	Tue Jan 14 20:18:38 2014	(r260648)
+++ releng/10.0/release/doc/en_US.ISO8859-1/relnotes/article.xml	Tue Jan 14 21:06:44 2014	(r260649)
@@ -132,7 +132,65 @@
   <sect2 xml:id="security">
     <title>Security Advisories</title>
 
-    <para>No security advisories.</para>
+    <para>Problems described in the following security advisories have
+      been fixed.  For more information, consult the individual
+      advisories available from
+      <link xlink:href="http://security.FreeBSD.org/">FreeBSD
+	Security Information</link>.</para>
+
+      <informaltable frame="none" pgwide="0">
+	<tgroup cols="3">
+	  <colspec colwidth="1*" />
+	  <colspec colwidth="1*" />
+	  <colspec colwidth="3*" />
+	  <thead>
+	    <row>
+	      <entry>Advisory</entry>
+	      <entry>Date</entry>
+	      <entry>Topic</entry>
+	    </row>
+	  </thead>
+
+	  <tbody>
+	    <row>
+	      <entry><link
+		xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc">SA-13:14.openssh</link></entry>;
+	      <entry>19&nbsp;November&nbsp;2013</entry>
+	      <entry><para>OpenSSH AES-GCM memory corruption
+		vulnerability</para></entry>
+	    </row>
+
+	    <row>
+	      <entry><link
+		xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc">SA-14:01.bsnmpd</link></entry>;
+	      <entry>14&nbsp;January&nbsp;2014</entry>
+	      <entry><para>bsnmpd remote denial of service vulnerability</para></entry>
+	    </row>
+
+	    <row>
+	      <entry><link
+		xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc">SA-14:02.ntpd</link></entry>;
+	      <entry>14&nbsp;January&nbsp;2014</entry>
+	      <entry><para>ntpd distributed reflection Denial of Service vulnerability</para></entry>
+	    </row>
+
+	    <row>
+	      <entry><link
+		xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:03.openssl.asc">SA-14:03.openssl</link></entry>;
+	      <entry>14&nbsp;January&nbsp;2014</entry>
+	      <entry><para>OpenSSL multiple vulnerabilities</para></entry>
+	    </row>
+
+	    <row>
+	      <entry><link
+		xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc">SA-14:04.bind</link></entry>;
+	      <entry>14&nbsp;January&nbsp;2014</entry>
+	      <entry><para>BIND remote denial of service vulnerability</para></entry>
+	    </row>
+
+	  </tbody>
+	</tgroup>
+      </informaltable>
   </sect2>
 
   <sect2 xml:id="kernel">



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201401142106.s0EL6iGS063846>