From owner-freebsd-announce@freebsd.org Tue Jun 30 03:17:54 2015 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 544C199079D for ; Tue, 30 Jun 2015 03:17:54 +0000 (UTC) (envelope-from security-officer@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 4B6EC2A46; Tue, 30 Jun 2015 03:17:54 +0000 (UTC) (envelope-from security-officer@FreeBSD.org) Received: by freefall.freebsd.org (Postfix, from userid 1035) id 4994115C7; Tue, 30 Jun 2015 03:17:54 +0000 (UTC) To: FreeBSD Security Advisories Reply-To: freebsd-security@freebsd.org Precedence: bulk Message-Id: <20150630031754.4994115C7@freefall.freebsd.org> Date: Tue, 30 Jun 2015 03:17:54 +0000 (UTC) From: security-officer@FreeBSD.org (Xin LI) Subject: [FreeBSD-Announce] FreeBSD 8.4 EoL extension X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.20 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 30 Jun 2015 03:17:54 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Dear FreeBSD community, After the recent reminder about the upcoming EoL for FreeBSD 8.4, several issues have come to our attention related to earlier security advisories, most notably users have reported a regression with sendmail. We have decided to postpone the EoL date for 8.4 and 8-STABLE to August 1, 2015 to make sure that all known issues have been addressed. Because this extension is small, freebsd-update(8) will continue to warn about the approaching EoL for 8.4, and there is no plan to postpone its EoL further. Existing users of FreeBSD 8.4 or 8-STABLE are advised to upgrade to a newer release promptly. The currently supported branches and releases and their expected end-of-life dates are: +----------------------------------------------------------------------------+ | Branch | Release | Type | Release Date | Estimated EoL | +-----------+------------+--------+------------------+-----------------------+ |stable/8 |n/a |n/a |n/a |August 1, 2015 | +-----------+------------+--------+------------------+-----------------------+ |releng/8.4 |8.4-RELEASE |Extended|June 9, 2013 |August 1, 2015 | +-----------+------------+--------+------------------+-----------------------+ |stable/9 |n/a |n/a |n/a |last release + 2 years | +-----------+------------+--------+------------------+-----------------------+ |releng/9.3 |9.3-RELEASE |Extended|July 16, 2014 |December 31, 2016 | +-----------+------------+--------+------------------+-----------------------+ |stable/10 |n/a |n/a |n/a |last release + 2 years | +-----------+------------+--------+------------------+-----------------------+ |releng/10.1|10.1-RELEASE|Extended|November 14, 2014 |December 31, 2016 | +----------------------------------------------------------------------------+ - -- Xin Li Security Officer of the FreeBSD Project -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.5 (FreeBSD) iQIcBAEBCgAGBQJVkgk0AAoJEO1n7NZdz2rnuIcQALGV2gqGuKOhU3OZQZJC6VWM ljm8rhpPLkwRj9s0lJhWMCgPj89+zT3h1MESsWwOeXgOTUB+fiOQgCap9vTjm3OW ZMfUxbILYbnqOZ2TeLP/wQDH/MxH6AoKBmd6Dbla/Nah6o6tBLgTbmmL3dlELQ9w PMUC2i+RJXsJD2idOjQGzHQX/KJB/mc3Z+5y3+7eEmKWbwDA4c0mlPxMlt9Gucw3 CKkONqi9v6C7+pbTaqIFV8cJZjaE4rmKiVL6SoqpT2HQyMtceMuPLv3/11+vpacq wBWZSka1zdeYgB521jwaem1mhydXcmneviCWQXcq5VVW5Anf2f+7z7aLSAvTNqRZ S7LK4sp6dXiOBalnOZZrRtq5cb9gLQGx3BQOR/Qbkwbq3Gv+IcgJkKxZ75XsUS7b H1m0dJ1+RJg6nTcWgQvWi7O09Z4jElmpH1IigqIrLu0wl60nTN0gQ1bhcANSQ8mo NLphtNWscUEE4w5xNHeqWIUJ7pY1bPjUwVOt/gDc861EGtQW8Toci6fyanTSzjtl ZLgclBhCVQMdfbHPsH9tBncPYO8mUMLCOmJTmouy5iElag7wdqL1zirfBMzKIEix EkzWWPGiuY36Iu4uF37lXkYysLZVjZvUi4PBQFmlxCV/jrijEYYrMw0xfUKAUM4t 6bCnDpgRdWAsAoRqka+G =zoTs -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Tue Jun 30 23:43:55 2015 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D8C0E990BB9 for ; Tue, 30 Jun 2015 23:43:54 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id B786E1281; Tue, 30 Jun 2015 23:43:54 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1035) id B66D21DAE; Tue, 30 Jun 2015 23:43:54 +0000 (UTC) From: FreeBSD Errata Notices To: FreeBSD Errata Notices Reply-To: freebsd-stable@freebsd.org Precedence: bulk Message-Id: <20150630234354.B66D21DAE@freefall.freebsd.org> Date: Tue, 30 Jun 2015 23:43:54 +0000 (UTC) Subject: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:10.iconv X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.20 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 30 Jun 2015 23:43:55 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-EN-15:10.iconv Errata Notice The FreeBSD Project Topic: Improved iconv(3) UTF-7 support Category: core Module: libc/iconv Announced: 2015-06-30 Credits: Tijl Coosemans Affects: FreeBSD 10.x Corrected: 2015-06-02 09:42:00 UTC (stable/10, 10.1-STABLE) 2015-06-30 23:21:37 UTC (releng/10.1, 10.1-RELEASE-p14) For general information regarding FreeBSD Errata Notices and Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background The iconv(3) API allows converting text data from one character set encoding to another. Applications first open a converter between two encodings using iconv_open(3) and then convert text using iconv(3). UTF-7 is a variable-length character encoding representing Unicode text using a stream of ASCII characters. II. Problem Description A defect in the iconv(3) UTF-7 decoding process causes the end of base64 symbols ("-") to be treated as an incomplete character when they exist at the end of the string. III. Impact Applications that use iconv(3) to decode UTF-7 may receive an incorrect encoded result. IV. Workaround No workaround is available. V. Solution Perform one of the following: 1) Upgrade your system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. 2) To update your present system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install 3) To update your present system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/EN-15:10/iconv.patch # fetch https://security.FreeBSD.org/patches/EN-15:10/iconv.patch.asc # gpg --verify iconv.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in . Restart all deamons using the library, or reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/10/ r283908 releng/10.1/ r284985 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this Errata Notice is available at https://security.FreeBSD.org/advisories/FreeBSD-EN-15:10.iconv.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.5 (FreeBSD) iQIcBAEBCgAGBQJVkyZQAAoJEO1n7NZdz2rnue4P/2TGL5ucl/YypMQAcgDxRn77 3zky6DhJSWx0ydnoCsFNogiK2A9qdw6YHvYMyqwjcVTZ9NpjeXSOnuEgaD6SN9Xj elIkvxPkbome8QDJAVsW+amqw1ipfJ4deN4XQqzbRTaNBd0Yo0jsC4S7zjVq+gwE 0EJ98vYQz8KfOFRW5Y1DlCS2OkapuGHPcxBJsRGoz5Y4Qe8KYDivRDZPJsrhbEWY +QF+xjZ+ZDvCl6qBSVcYgsVNeMr6jHjmIS2BYSeWypKmI1LfPgZszOMCZsS/rvAs DKsm9N7GcbMVCD0tUWSOQmN1jtfBEoYtgqoHg1/wg5/jTOlcVQgANVMF5p9jqo/Q BGBUWfwQACZ4cJI/lXTqUt87Dg1n15JtU011nDCfbK4Ll9ZaYioAisqx2kXdUgBP ojP3XMwoFtq2tJGJZLlIG3nWm3IatsOL+vtZxw6N4Y5PVksZeCctFikm7FhsCXjk SCVSn3w+rLP1klWSCbqUUtpvRSMP3JZDH7auytvykUZ2pncKAzwhfb+TI9Qqnguk RkSDUDnRvLEuwezZOAZ3lErVV/G38zyi6Hn/ODeO0Cg6w70XKdbuWqgf0z3etz7M HiHk4dpVNO7S4Y12wNdin1XgXa94s08wyiY7bSGpDaqL22O6CHgd0B+NAsqUqJSx lAsbtw23ytA4JwkVwIdf =hK2X -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Tue Jun 30 23:43:54 2015 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E4345990BBA for ; Tue, 30 Jun 2015 23:43:54 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id B7B0E1282; Tue, 30 Jun 2015 23:43:54 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1035) id B69DB1DAF; Tue, 30 Jun 2015 23:43:54 +0000 (UTC) From: FreeBSD Errata Notices To: FreeBSD Errata Notices Reply-To: freebsd-stable@freebsd.org Precedence: bulk Message-Id: <20150630234354.B69DB1DAF@freefall.freebsd.org> Date: Tue, 30 Jun 2015 23:43:54 +0000 (UTC) Subject: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:09.xlocale X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.20 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 30 Jun 2015 23:43:55 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-EN-15:09.xlocale Errata Notice The FreeBSD Project Topic: Inconsistency between locale and rune locale states Category: core Module: libc Announced: 2015-06-30 Credits: David Chisnall Affects: FreeBSD 9.x and FreeBSD 10.x. Corrected: 2015-06-17 19:12:18 UTC (stable/10, 10.1-STABLE) 2015-06-30 23:21:37 UTC (releng/10.1, 10.1-RELEASE-p14) 2015-06-17 19:13:13 UTC (stable/9, 9.3-STABLE) 2015-06-30 23:21:48 UTC (releng/9.3, 9.3-RELEASE-p18) For general information regarding FreeBSD Errata Notices and Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background Recent FreeBSD releases have support to thread-safe and extended locale API, modeled after the Darwin xlocale(3) API. The C standard locale API was reimplemented as a wrapper of the xlocale(3) API with a global locale in order to support its semantics. II. Problem Description The locale and rune locale may become out of sync, in which case calls of mb* and similar functions would be supplied with wrong data. III. Impact Applications that uses xlocale but does not call setlocale(3) would crash. IV. Workaround No workaround is available. V. Solution Perform one of the following: 1) Upgrade your system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. 2) To update your present system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install 3) To update your present system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/EN-15:09/xlocale.patch # fetch https://security.FreeBSD.org/patches/EN-15:09/xlocale.patch.asc # gpg --verify xlocale.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in . Restart all deamons using the library, or reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/9/ r284525 releng/9.3/ r284986 stable/10/ r284524 releng/10.1/ r284985 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this Errata Notice is available at https://security.FreeBSD.org/advisories/FreeBSD-EN-15:09.locale.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.5 (FreeBSD) iQIcBAEBCgAGBQJVkyZQAAoJEO1n7NZdz2rnitMQAK5jY0n9Kv0VDwP5J4EXdcHZ SOEE8n5O+bwWxVFWkqGGZrPQiUuJt6ujrAJb2iSeUtKIa2E84TLDVjmWGtyqP/RN rLlRjVVQo14EhSScRI54oUeAYpoBWU8oRtFiixFbw24gFEW/ZeovFxQUY1Waueuy Xpx28cmqQ3KG/T+Ujq1edHrtMpqwsBQd93eHRFSjtWaMrxmjnr4ln66AerdPQAYx ib2rznxy+MCF0rmHbTsYnpZKZ1DupcyU7YkOdhVTk8cviL44wPGaCrA9Oaf6Q2hW NTek9h5VQhvmhWaPsUZTGbQYPkvFjvEbmKOxRV+Mtf+UBt2y7SoqACpP1BbCC77n 8uRGdI8MPpC1j9RHZ5miWz4NkA3W1Pa/oi66PRhenzXgDe9Ua4aykklqnINhOrgm ZBCLz1DXnx4WyeW2FIf7Z9GGcF3sUd9RU2e4H0WI3uZ75PT7p/zq1L4FKxXEn9/7 VoGy6cyQWwFUZ27lIcSGLeUhSolrtDofHPwKe8YB12bTXPhxjNYs+4iYWF0ZScOE Wr9Jx7mKecNQ+jD5iEP2Ne7tzqSPSDZGzwkvifz+dmHT5L9hx6Pu916xp6/kzVg1 up31EcoQOn1N/ZHjC9VgGmyOgdA5ENHKNPhzcYp2CrJSadBHQHeINfwbRLdzLjVl Nnt+YSShqakxvZhNmTex =Wfyl -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Tue Jun 30 23:43:54 2015 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C92B8990BB8 for ; Tue, 30 Jun 2015 23:43:54 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id B77AC1280; Tue, 30 Jun 2015 23:43:54 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1035) id B62F11DAD; Tue, 30 Jun 2015 23:43:54 +0000 (UTC) From: FreeBSD Errata Notices To: FreeBSD Errata Notices Reply-To: freebsd-stable@freebsd.org Precedence: bulk Message-Id: <20150630234354.B62F11DAD@freefall.freebsd.org> Date: Tue, 30 Jun 2015 23:43:54 +0000 (UTC) Subject: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:08.sendmail X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.20 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 30 Jun 2015 23:43:55 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-EN-15:08.sendmail Errata Notice The FreeBSD Project Topic: sendmail TLS/DH Interoperability Improvement Category: contrib Module: sendmail Announced: 2015-06-18; Last revised on 2015-06-30. Credits: Frank Seltzer, Gregory Shapiro Affects: All supported versions of FreeBSD. Corrected: 2015-06-25 01:49:44 UTC (stable/10, 10.1-STABLE) 2015-06-30 23:21:37 UTC (releng/10.1, 10.1-RELEASE-p14) 2015-06-25 01:53:45 UTC (stable/9, 9.3-STABLE) 2015-06-30 23:21:48 UTC (releng/9.3, 9.3-RELEASE-p18) 2015-06-25 01:56:36 UTC (stable/8, 8.4-STABLE) 2015-06-30 23:21:59 UTC (releng/8.4, 8.4-RELEASE-p32) For general information regarding FreeBSD Errata Notices and Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . 0. Revision history v1.0 2015-06-18 Initial release. v1.1 2015-06-30 Revised patch for non-existent DH parameter file. I. Background Sendmail supports STARTTLS encrypted connections using DHE_EXPORT ciphers. As part of that support, by default, Sendmail employs 1024-bit DH parameters for server connections but 512-bit DH parameters if configured to use a DH parameter file that does not exist. II. Problem Description In response to CVE-2015-4000 ("Logjam TLS vulnerability"), OpenSSL and other encryption packages have begun rejecting 512-bit and lower DH parameters during negotiation, thereby reducing interoperability. III. Impact In its default FreeBSD configuration, client connections from Sendmail to other SMTP servers will not be able to negotiate a STARTTLS encrypted session with SMTP servers that reject 512-bit DH parameters. This may cause mail deliverability issues for outbound mail. IV. Workaround Systems that do not use Sendmail are not affected. To work around this interoperability, Sendmail can be configured to use a 1024 or 2048 bit DH parameter using these steps: 1. Edit /etc/mail/`hostname`.mc 2. If a setting for confDH_PARAMETERS does not exist or exists and is set to a string beginning with '5', replace it with '1' for 1024-bit or '2' for 2048-bit. 3. If a setting for confDH_PARAMETERS exists and is set to a file path, create a new file with: openssl dhparam -out /path/to/file 2048 for 2048-bit or: openssl dhparam -out /path/to/file 1024 for 1024-bit. 4. Rebuild the .cf file: cd /etc/mail/; make; make install 5. Restart sendmail: cd /etc/mail/; make restart V. Solution A change to the raise the default for Sendmail connections to use 1024-bit DH parameters if the configured DH parameters file does not exist has been committed. Perform one of the following: 1) Upgrade your system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. 2) To update your present system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install 3) To update your present system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/EN-15:08/sendmail.patch # fetch https://security.FreeBSD.org/patches/EN-15:08/sendmail.patch.asc # gpg --verify sendmail.patch.asc # fetch https://security.FreeBSD.org/patches/EN-15:08/sendmail-01.patch # fetch https://security.FreeBSD.org/patches/EN-15:08/sendmail-01.patch.asc # gpg --verify sendmail.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in . Restart the Sendmail daemon(s), or reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/8/ r284790 releng/8.4/ r284987 stable/9/ r284788 releng/9.3/ r284986 stable/10/ r284786 releng/10.1/ r284985 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this Errata Notice is available at https://security.FreeBSD.org/advisories/FreeBSD-EN-15:08.sendmail.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.5 (FreeBSD) iQIcBAEBCgAGBQJVkyZLAAoJEO1n7NZdz2rnsdsP/2+xJUiaNWialSFlTwE75sHC vN/CrkceLw6QrUi5U0PpQdI7xP/y8Cspj/vDCNUbHlkK8WfA5G8J6WhyyaVxMREG aZTPHFBn0/IeP2vxlyf0PLq6hL1KtasOQNjDEasUMb4uclaE+hn3QxrWk+KGoe8B 8rZHYS6Y9gOfWLJj7Rvf6T6TEtKf8Mz1cBfn7lRQbF7yDwkvNDpmNv7BhTQOM5rw /2q2i4ZjuZT4AX0IaSzZLC1dEyxuUKqAxMV1D+F1WYBQqMUwnoJLMAETmWXphuSa QGDNU0w3PbAJrgK06qeLSswVo/r/5h+kjra5eL17MPKZPO+sWHv9E1jS7wUsbsFB RE7kcafgWcN9S0TBldyuFo9g8nwjsWq4uooSLrf8pG8y7U6FtXbgyitS3BNVKT7i 9GqzTi89HKPefnPQR5wfJIl9YXgKvWJ/FNei7MpGTl2LGKHSd2P/21+OoIjfNeQl hYOP9uWDrk3Uf7gJVrJOobMfme5Zb1/LDSQegTIFjzQ0Iac1p4nqj53rzG2Nufyx /Y93rKOz280NCS193buARcl4KmFp9oGaJTjVG9Cthu8FUFlCkCeZl13ZrhDufKBS z2ZEwkIYFamOFjbhCUJ5wm3gsozV7bzAOSRQEFEzzLDlYGPv2RPDAlgREcuzxr8N OhK1HFcIqXbXRthWN7Sp =ibhZ -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Wed Jul 1 14:36:12 2015 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4B55599198C; Wed, 1 Jul 2015 14:36:12 +0000 (UTC) (envelope-from m@absolight.fr) Received: from prod2.absolight.net (mx3.absolight.net [IPv6:2a01:678:2:100::25]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "plouf.absolight.net", Issuer "CAcert Class 3 Root" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 123FD1AC6; Wed, 1 Jul 2015 14:36:11 +0000 (UTC) (envelope-from m@absolight.fr) Received: from localhost (localhost [127.0.0.1]) by prod2.absolight.net (Postfix) with ESMTP id EBACFBDC6E; Wed, 1 Jul 2015 16:36:08 +0200 (CEST) X-Virus-Scanned: amavisd-new at absolight.net X-Spam-Flag: NO X-Spam-Score: -2.808 X-Spam-Level: X-Spam-Status: No, score=-2.808 tagged_above=-200 required=5 tests=[AWL=-0.900, BAYES_00=-2.599, DNS_FROM_AHBL_RHSBL=0.692, NO_RELAYS=-0.001] Received: by prod2.absolight.net (Postfix, from userid 1001) id 1DE23BDC64; Wed, 1 Jul 2015 16:36:05 +0200 (CEST) Date: Wed, 1 Jul 2015 16:36:05 +0200 From: Mathieu Arnold To: freebsd-ports@freebsd.org Cc: freebsd-announce@freebsd.org Message-ID: <20150701143603.GA2340@prod2.absolight.net> Reply-To: freebsd-ports@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="TB36FDmn/VVEgNH/" Content-Disposition: inline User-Agent: Mutt/1.5.18 (2008-05-17) X-Mailman-Approved-At: Wed, 01 Jul 2015 15:49:29 +0000 Subject: [FreeBSD-Announce] New 2015Q3 branch X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Jul 2015 14:36:12 -0000 --TB36FDmn/VVEgNH/ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi, The 2015Q3 branch has been created. It means that the next update on the quarterly packages will be on the 2015Q3 branch A lot of things happened in the last three months: - pkg 1.5.4 - New USES: waf, gnustep, jpeg - Default version of Perl switched to 5.20 - Firefox 38.0.6 - Firefox-esr 31.7.0 - Chromium 43.0.2357.130 - Ruby 2.1.6 - Perl 5.22.0 Next quarterly package builds will start on tomorrow and should be available on your closest mirrors few days later. For those stat nerds out there, here's what happened during the last 3 mont= hs on head: Number of commits: 7829 Number of committers: 153 Most active committers: 1741 sunpoet 1458 amdmi3 280 bapt 234 mat 219 antoine 190 olgeni 188 jbeich 182 marino 162 swills 141 adamw and on the 2015Q2 branch: Number of commits: 305 Number of committers: 39 Most active committers: 112 amdmi3 33 delphij 27 antoine 21 jbeich 14 riggs 11 sunpoet 11 rene 6 truckman 6 bdrewery 5 xmj Diffstat: 768 files changed, 20947 insertions(+), 22176 deletions(-) Regards, --=20 Mathieu Arnold --TB36FDmn/VVEgNH/ Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (FreeBSD) iQJ8BAABCgBmBQJVk/rTXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQzQUI2OTc4OUQyRUQxMjEwNjQ0MEJBNUIz QTQ1MTZGMzUxODNDRTQ4AAoJEDpFFvNRg85IWyAQAIT+3JYyfan4VxF0J1fpwiot a4tiGVHb7Ev+v0OhbBM13yjK9ON+simiqTremFPFgOq64A3SJVMdNnRCAUR892Fj 5jNvCnYULbVB/U5wPmec1i7kMgihqrc0yCRuN8U2o2RyE0JjLmo1Xj3vyuuluZhH +tBbPf/7mHPeWYjYIvTmNwZg9h6DpXKKp3GttIlZp1bza47/JKJxRJMuytqGK/hV +gpjkqbhsvP7Vn+mtr+b38/zFPWTnY/AWtdiJ5AUkErZ4mxLP4guII2ExeJWAE6I 6DUahY/AeXbplokAC8k93Tsl5KyhTz53bMlK6TbfspMxk2SjcgX6n0Tv8nhAYxvy piZk23XNjhXC8L+DMjDmnanTuxPYqeBx7GuUOY02d3YRyBoGo2esGfjlomltjDmF kN/x4eOlfIYBZhNfuqNgQCY5rIQ3NIi7uVksVLF0+SwosXmLk+FVXsL0bmdmtBS/ L+gP3uW5PC0cT7yTyjDhzDzkT065yz2hzh5RqgyzPF+7826jADPbQ4RhZzN6/ayx MaQDX9FXmKElOtOO/iBgSGKphEcvFWy/2kzr9uPo8BdUmhuIQRs+PZ4rWBN8VHnd gO97fvf4pJoPQJyhqT8zJl7+b7q9p55ojeuPQuYCWjlrWkWW8RjwpJA3nwCj9+7U oY6iZNYXoRhWZbfE66G+ =IQ3D -----END PGP SIGNATURE----- --TB36FDmn/VVEgNH/--