ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/www/trunk/index.html
Revision: 592
Committed: Sun Mar 29 19:20:36 2015 UTC (9 years, 1 month ago) by laffer1
Content type: text/html
File size: 5323 byte(s)
Log Message:
add verification

File Contents

# Content
1 <!DOCTYPE html>
2 <html lang="en-us">
3 <head>
4 <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
5 <meta name="description" content="MidnightBSD is a desktop operating system for x86 and x86-64 based PCs.">
6 <meta name="viewport" content="width=device-width, initial-scale=1">
7 <title>
8 MidnightBSD
9 </title>
10 <link rel="shortcut icon" href="favicon.ico">
11 <link href="https://plus.google.com/112694070346575096682/" rel="publisher">
12 <link rel="alternate" type="application/rss+xml" title="MidnightBSD Developer Blog" href="http://feedproxy.google.com/mnbsd">
13 <link rel="stylesheet" type="text/css" href="css/essence.css">
14 <meta property="og:image" content="http://www.midnightbsd.org/art/logo/MidnightBSDLogo128x128.png">
15 <meta property="og:site_name" content="MidnightBSD">
16 <meta property="og:url" content="https://www.midnightbsd.org/">
17 <meta property="og:title" content="MidnightBSD">
18 <meta property="og:description" content="MidnightBSD is a desktop operating system for x86 and x86-64 based PCs.">
19 <meta name="google-site-verification" content="UXeYyeq09VC4mCiCHwnLjorG3nxUoyOTcdhR0frXXpw">
20 <meta name="alexaVerifyID" content="pP_-WGlPDrDVXvxAfGsMp0R52to">
21 <meta name="norton-safeweb-site-verification" content="6163-7rd73ayryzu61oa56uekhrcv5rl0vd0u2oigy1vp611upuo2jwrs4c3lydip56f1km8mc6c9tqm-dmrwztwqwaj7ofnq6p0y0axqjue98d4083t3l83yf3d04nc">
22 </head>
23 <body>
24 <div id="globe">
25 <div id="header">
26 <h1 title="MidnightBSD Home">
27 <a href="./" title="MidnightBSD Home">MidnightBSD: The BSD For Everyone</a>
28 </h1>
29 </div>
30 <!--#include virtual="/menu.html"-->
31 <div class="clear">
32 </div>
33 <div id="welcomebox">
34 <div class="clear">
35 </div>
36 <div id="welcome">
37 <h2>
38 Welcome to MidnightBSD
39 </h2>
40 <blockquote>
41 <p>
42 MidnightBSD is a new BSD-derived operating system developed with desktop users in mind. It includes all the software you'd expect for your daily tasks &#8212; email, web browsing, word processing, gaming, and much more.
43 </p>
44 <p>
45 With a small community of dedicated developers, MidnightBSD strives to create an easy-to-use operating system everyone can use, freely. Available for x86, AMD64 and as Virtual Machines.
46 </p>
47 </blockquote>
48 </div>
49 <div id="getbox">
50 <div id="gettext">
51 <h2>
52 <a href="download/">
53 Get MidnightBSD
54 </a>
55 </h2>
56 <h3>
57 Latest Release - 0.5.2
58 </h3>
59 <div id="getcd">
60 <a href="download/" title="Get MidnightBSD">
61 </a>
62 </div>
63 <div class="clear">
64 </div>
65 <h4>
66 <a href="notes/">
67 Release Notes
68 </a>
69 </h4>
70 </div>
71 </div>
72 </div>
73 <div class="clear">
74 </div>
75 <div id="gravity" style="padding-top: 10px;">
76 <div id="news">
77 <h2>
78 <a href="news/">
79 News &#187;
80 </a>
81 </h2>
82 <!--#include file="mbsdblogsum.inc"-->
83 </div>
84 <div id="security">
85 <h2>
86 <a href="security/">
87 Security &#187;
88 </a>
89 </h2>
90 <blockquote>
91 <p class="date">
92 March 19, 2015
93 </p>
94 <p class="update">
95 0.5.10 RELEASE <br> OpenSSL Security update <br> A malformed elliptic curve private key file could cause a use-after-free condition in the d2i_ECPrivateKey function. [CVE-2015-0209] <br> An attempt to compare ASN.1 boolean types will cause the ASN1_TYPE_cmp function to crash with an invalid read. [CVE-2015-0286] <br> Reusing a structure in ASN.1 parsing may allow an attacker to cause memory corruption via an invalid write. [CVE-2015-0287] <br> The function X509_to_X509_REQ will crash with a NULL pointer dereference if the certificate key is invalid. [CVE-2015-0288] <br> The PKCS#7 parsing code does not handle missing outer ContentInfo correctly. [CVE-2015-0289] <br> A malicious client can trigger an OPENSSL_assert in servers that both support SSLv2 and enable export cipher suites by sending a specially crafted SSLv2 CLIENT-MASTER-KEY message. [CVE-2015-0293]
96 </p>
97 <p class="more">
98 <a href="security/#a20150319">
99 Read more ...
100 </a>
101 </p>
102 </blockquote>
103 <blockquote>
104 <p class="date">
105 February 25, 2015
106 </p>
107 <p class="update">
108 0.5.9 RELEASE <br> Fix two security vulnerabilities. <br> 1. BIND servers which are configured to perform DNSSEC validation and which are using managed keys (which occurs implicitly when using "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit unpredictable behavior due to the use of an improperly initialized variable. <br> CVE-2015-1349 <br> 2. An integer overflow in computing the size of IGMPv3 data buffer can result in a buffer which is too small for the requested operation. <br> This can result in a DOS attack.
109 </p>
110 <p class="more">
111 <a href="security/#aa20150225">
112 Read more ...
113 </a>
114 <p>
115 </blockquote>
116 </div>
117 <div id="tweets">
118 <a class="twitter-timeline" href="https://twitter.com/midnightbsd" data-widget-id="340874433373806593">
119 Tweets by @midnightbsd
120 </a>
121 <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>
122 </div>
123
124 <div>
125 <p>View available <a href="mports/">mports</a></p>
126 </div>
127 </div>
128 <!--#include virtual="/footer.html"-->
129 </body>
130 </html>