diff --git a/nixos/doc/manual/release-notes/rl-2009.xml b/nixos/doc/manual/release-notes/rl-2009.xml
index 1f1e785021b..49446afdead 100644
--- a/nixos/doc/manual/release-notes/rl-2009.xml
+++ b/nixos/doc/manual/release-notes/rl-2009.xml
@@ -1513,24 +1513,6 @@ services.transmission.settings.rpc-bind-address = "0.0.0.0";
to get the previous behavior of listening on all network interfaces.
-
-
- The security.apparmor module,
- for the AppArmor
- Mandatory Access Control system,
- has been substantialy improved along with related tools,
- so that module maintainers can now more easily write AppArmor profiles for NixOS.
- The most notable change on the user-side is the new option ,
- replacing the previous profiles option
- to provide a way to disable a profile
- and to select whether to confine in enforce mode (default)
- or in complain mode (see journalctl -b --grep apparmor).
- Before enabling this module, either directly
- or by importing <nixpkgs/nixos/modules/profiles/hardened.nix>,
- please be sure to read the documentation of security.apparmor.enable,
- and especially the part about .
-
-
With this release systemd-networkd (when enabled through )
diff --git a/nixos/doc/manual/release-notes/rl-2105.xml b/nixos/doc/manual/release-notes/rl-2105.xml
index e0552c25a85..6a738214096 100644
--- a/nixos/doc/manual/release-notes/rl-2105.xml
+++ b/nixos/doc/manual/release-notes/rl-2105.xml
@@ -857,6 +857,24 @@ environment.systemPackages = [
Note that users defined with an explicit UID below 500 are exempted from this check, as has no effect for those.
+
+
+ The security.apparmor module,
+ for the AppArmor
+ Mandatory Access Control system,
+ has been substantialy improved along with related tools,
+ so that module maintainers can now more easily write AppArmor profiles for NixOS.
+ The most notable change on the user-side is the new option ,
+ replacing the previous profiles option
+ to provide a way to disable a profile
+ and to select whether to confine in enforce mode (default)
+ or in complain mode (see journalctl -b --grep apparmor).
+ Before enabling this module, either directly
+ or by importing <nixpkgs/nixos/modules/profiles/hardened.nix>,
+ please be sure to read the documentation of security.apparmor.enable,
+ and especially the part about .
+
+
The GNOME desktop manager once again installs gnome3.epiphany by default.