From nobody Mon Jun 17 08:07:12 2024 X-Original-To: dev-commits-doc-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4W2jCh5X0Lz5NcPM for ; Mon, 17 Jun 2024 08:07:12 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4W2jCh4WGnz4H8x; Mon, 17 Jun 2024 08:07:12 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718611632; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=0BgZyxdIMuXgLUV3EjTGQcPuuPY4gJ/kTQer0NStwcQ=; b=SbnviK2lBemepfRhFsM+k/6wZbpnmBpoe1JJNzkMi5GKmOmgnVv/2BDbVpJCJHnTAROIGA sElI3p+oEbcBAFc7qXSXMG7tbCO1kCgSHdSoLPY92Dw9R9s2LgU7y2JD+ZLxUor+Ueqf/l TR6gFWmuRCPZ7NwhtRbCDCSkjyHVPBqRf21VPc2LYt6xo6Mm1jhRapCxuByA/Ny3xa9WCD Tsmqr0dpUx8OaATEPYMwcfwq/8tFN6Yp4OufiMT15VGYi45TI0mukiel7YB0+uz/iYlcUr tr0MSycO5tDvgc/8eFOUofyBYxPfAM1ngGWCkCg8xFw5UCXQTXJbZzmpHjtiKg== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1718611632; a=rsa-sha256; cv=none; b=ldYypl05GfBunvi17UWcwmEy+28vEtZ8Qq4DOWf2tMiCpX6W5riNacSuIPLNXTfzSBYTSs eERv3UhIAlGrQFR01KHwwDUOI//jd43JdLSsmNS2CETigrUTC6TcaEQwXlKZAJ84jBN6M6 4PcA6EQ8sVWak0P52qVaVBgoMfqB3KvUbzyMntqLmLcrT4W8ihwyWAvCqxru+tf24noVlR xMqTk/jv5I09Q7gYexUCZaFx+tBG3pLx+2Apkomg87oJwHW//QPcJrigAdzX5XbNcEouUi z+Io25HBxkV9dpATpNVd6PCWqisj7sS/gEW2rAcIP7bOT4OW8PV77yZm5D5Leg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718611632; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=0BgZyxdIMuXgLUV3EjTGQcPuuPY4gJ/kTQer0NStwcQ=; b=YjPXN0PNyQhMd0HkNknQAnJoHlVERRLh40ocgqj4AEVrdFPh9VZY66n6r6lA6zCgkbWO1M gTSwDY8rQL0uvY6668S87vdhaLw7sxguWcrlLmAfgSLFoLrcPRMfU9UEfdCseC5ExXknIQ AHYuTjeyWvGV9l9KSA5pEMAnJ6TjPx/1pyRM7rYzzTFKSZebo853dogBY9sNGe4Jyrd4uc Kmhlc0/YszHwXH3MIsq/0vkbwSwdz/spypmvpZ22RZngw8sO6Y1Z9GS0vH3S5xth0kqtAF gLmjmiafNpPtnap3pNm1+buVjVRnx5UOLdcWa5so9TWDCT7v1BIcY3oaw9jrMg== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4W2jCh45T5z1MHR; Mon, 17 Jun 2024 08:07:12 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 45H87Cju045352; Mon, 17 Jun 2024 08:07:12 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 45H87CVI045349; Mon, 17 Jun 2024 08:07:12 GMT (envelope-from git) Date: Mon, 17 Jun 2024 08:07:12 GMT Message-Id: <202406170807.45H87CVI045349@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Colin Percival Subject: git: affea44c50 - main - 14.1: Belatedly update schedule List-Id: Commit messages for all branches of the doc repository List-Archive: https://lists.freebsd.org/archives/dev-commits-doc-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-doc-all@freebsd.org Sender: owner-dev-commits-doc-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: cperciva X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: affea44c50bbf08470047b3725c76faab1c5cf2b Auto-Submitted: auto-generated The branch main has been updated by cperciva: URL: https://cgit.FreeBSD.org/doc/commit/?id=affea44c50bbf08470047b3725c76faab1c5cf2b commit affea44c50bbf08470047b3725c76faab1c5cf2b Author: Colin Percival AuthorDate: 2024-06-17 08:06:23 +0000 Commit: Colin Percival CommitDate: 2024-06-17 08:07:01 +0000 14.1: Belatedly update schedule The releng/14.1 branch was handed over to so@ on June 11th. --- website/content/en/releases/14.1R/schedule.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/content/en/releases/14.1R/schedule.adoc b/website/content/en/releases/14.1R/schedule.adoc index 646a368d6d..b1aa9505d8 100644 --- a/website/content/en/releases/14.1R/schedule.adoc +++ b/website/content/en/releases/14.1R/schedule.adoc @@ -40,7 +40,7 @@ General discussions about the pending release and known issues should be sent to |RC1 builds begin |24 May 2024 |25 May 2024 |Release candidate. |RELEASE builds begin |31 May 2024 |31 May 2024 |{localRel}-RELEASE builds begin. |RELEASE announcement |4 June 2024 |4 June 2024 |{localRel}-RELEASE press release. -|Turn over to the secteam |- |- |{localBranchReleng} branch is handed over to the FreeBSD Security Officer Team in one or two weeks after the announcement. +|Turn over to the secteam |- |11 June 2024 |{localBranchReleng} branch is handed over to the FreeBSD Security Officer Team in one or two weeks after the announcement. |=== //// From nobody Mon Jun 17 08:10:38 2024 X-Original-To: dev-commits-doc-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4W2jHg16fRz5NchW for ; Mon, 17 Jun 2024 08:10:39 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4W2jHg0hMzz4Hfp; Mon, 17 Jun 2024 08:10:39 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718611839; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Vju+87aXUI3IHY0R+3/vfYq4eJ5b4rj0kQrvs2XEggs=; b=ePSuzqbBrZzNm9fYftY8RKbbOCd02AGdRRetrojjvzFhswFCWNyDeX1FQRHCquLYj4JD1/ YvceHQnWAiJaZ6PjwijF4iS/W9MGLy7+k9cEkHp8Gjvs4mRZ5EMkaw5+kbsPFof1oCGYNv Jbg4iI6rrd16pilE6JhaMv+WVM3s3jq/CC9+x3v+BXdkrGIXUzadb5oe6PeQ66riYjPClF FOX8M9GLDablRaRmVjXUKe2V1HH/95ZFvOeLSARBHzTBlrFJ/t1cFbn6SiVCby+Q4vPITx OAF/SgHJGNoGyytbKmlHtMoQEVoSh1t7fzAcWSMCRISWyxicueS4sERTycLzHg== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1718611839; a=rsa-sha256; cv=none; b=ZebM/Jx5gDSTdNmgk2MZpX1LFGnK7kMkCC0a9V3XXHsVC6iHeKXT6B6wveVmlbUBf2DnWF pHtxFS2iWT7blYVJJaKaWfNbIpq8rDAXce++Z93+SlXtnxEO965/mOWgQZiKV5LoINbUlr ieqz+ajTRxBNUCVYjP1gCL4wxxDt8YIZtgkQ6BzBb0vixzAzqKGwtDwM19TJLh1g+x+c3F iXgk1Jc2VieBVg1grJz3HbDwbE44LjXYde+YluxKpcvXEdAKMDEpsMQ4+rIQoxXSaXWcJW 7pyeQaxEa56W6yvwwIHs3McLjHfWsgg39LExWY1eoOglp3jCBADnMdDq/vfFtw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718611839; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Vju+87aXUI3IHY0R+3/vfYq4eJ5b4rj0kQrvs2XEggs=; b=eemI8pPfV0J9B30S31bfGgzDSeBIyuGr4UhkBF/KjM34AfRfaWJx2agXCsGED03xwaiftZ UTsGnASy6DqZ5QDqMuAJ+EQR+xjEyEQRo4RQntC0gU5m1Y/JNy/MWLKxnuaQA9aZMlh2qj eHK4LthrZR5ikJjdFwJXA6FRUSRj7qDSxbF5wTu5FCFKLJrh6k8D+IdnlRFv4bX7IkFs9U 0y38og46ZP1MfYXcXMcdXL5zhPYTzP9H0TCcUN0hM06gHxcb7uEohnxDo2hfPitfPa8SYX f25DuXT2/2FI/VyEwq2vpS9AQXjRvE4+jsnZSEVeV/PE6Fib3NEw32nYCLIsLQ== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4W2jHg0Hhfz1Mcx; Mon, 17 Jun 2024 08:10:39 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 45H8AcQk054429; Mon, 17 Jun 2024 08:10:38 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 45H8Ac2h054426; Mon, 17 Jun 2024 08:10:38 GMT (envelope-from git) Date: Mon, 17 Jun 2024 08:10:38 GMT Message-Id: <202406170810.45H8Ac2h054426@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Colin Percival Subject: git: 0afb0e0aac - main - releng: Fix copy-and-past error List-Id: Commit messages for all branches of the doc repository List-Archive: https://lists.freebsd.org/archives/dev-commits-doc-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-doc-all@freebsd.org Sender: owner-dev-commits-doc-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: cperciva X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 0afb0e0aacb94a72742772a92353cbb642c7e817 Auto-Submitted: auto-generated The branch main has been updated by cperciva: URL: https://cgit.FreeBSD.org/doc/commit/?id=0afb0e0aacb94a72742772a92353cbb642c7e817 commit 0afb0e0aacb94a72742772a92353cbb642c7e817 Author: Colin Percival AuthorDate: 2024-06-17 08:08:41 +0000 Commit: Colin Percival CommitDate: 2024-06-17 08:09:34 +0000 releng: Fix copy-and-past error releng/14.1 is the FreeBSD 14.1 branch, not the FreeBSD 14.0 branch. Reported by: Graham Perrin --- website/content/en/releng/_index.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/content/en/releng/_index.adoc b/website/content/en/releng/_index.adoc index 6ebdfedb56..b6c7313159 100644 --- a/website/content/en/releng/_index.adoc +++ b/website/content/en/releng/_index.adoc @@ -47,7 +47,7 @@ This table lists the code freeze status for major branches of the `src/` reposit |Branch |Status |Contact |Notes |`main` |Open |committers |Active development branch for 15.0-CURRENT. |`stable/14` |Open |committers |Development branch for FreeBSD 14-STABLE. -|`releng/14.1` |Frozen |security-officer@FreeBSD.org |FreeBSD 14.0 supported errata fix branch. +|`releng/14.1` |Frozen |security-officer@FreeBSD.org |FreeBSD 14.1 supported errata fix branch. |`releng/14.0` |Frozen |security-officer@FreeBSD.org |FreeBSD 14.0 supported errata fix branch. |`stable/13` |Open |committers |Development branch for FreeBSD 13-STABLE. |`releng/13.3` |Frozen |security-officer@FreeBSD.org |FreeBSD 13.3 supported errata fix branch. From nobody Tue Jun 18 00:14:19 2024 X-Original-To: dev-commits-doc-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4W36gb4XQ1z5MCw3 for ; Tue, 18 Jun 2024 00:14:19 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4W36gb43CQz4kx6; Tue, 18 Jun 2024 00:14:19 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718669659; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=m44lhgAqZFqZCfS6ubPGsnf4Iw5v/5kx8CuzfdqrxFE=; b=H/sNyxkyDagA8wXompCySEWuzmibJ7j0khe7nipg2g8fPYgIn+Y1lCTNKhMzU4hVMDxzsT hm4NgYUN9bTnBsbWP7byE3OfTPwnXjv/wyREJtoVDYga3MWi4xXN0d0pW3C/zf6qWku+DD CVBDMU3YSkfb+U7NZqXmFHWDfN9lNK7bmH5/jngpCzGoJMNntRMJybglgonGlxi0Ys46ij Z6iwoW1CBfzu1wFZLQViwFnkOPNtqgWfxWXx0/FJMa4zwLpF+KpjKq/qsIEvu9oxo1g2Na 03FDCE92CYJXHiVwZH8uBRT+TX33HmUXNUlq+R0jlt3UtMe9Zxy8e2QzwhFMaA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1718669659; a=rsa-sha256; cv=none; b=s1Ut5nOphd7DvLzrLDYSzC6fQY8ypB4SnLmQcmE3dYdxJDqE/X+PENCax2fTSudFO0Xgqd WaIkQSPknDYYgF/xrfkBZJQCSrt/yIVX91H/mCLxV7rIt6V3KfkTnM6f7PL5AiURDGQDwQ emnBiDEtGLf18DvUbAUKLhMxcCPmIV0Y5WWvqlVdZQu/LvtHY/WM0qaf0c5lbCxTFsDFyt LqLS2IBgCLNnTzb1f+7f/7HvND51/S460HhkkrZl+suupsj7uBk2ddCHPhYFfxUlh6UIui +RRoAuDcCjvm+qSzq3JJ7kq+SVN4RvWJ5+6za/Xy11FWj1q4Jy1g8Jv8o/RvQg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718669659; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=m44lhgAqZFqZCfS6ubPGsnf4Iw5v/5kx8CuzfdqrxFE=; b=LlsJ32iHBvDO6eL4mpF2CgdpAZdpjyrvYGhURikgZv6wapli2P37YjLGvab8oN4VPHv30m 4jJIPeTDstgKgJZwoiNHRn0uZZ+OZX28b4aRrFXIIYVw357eRumUDhQu7uG00UZKHfF/u8 Op6gQaKWJOG9alY7EJIyN3McQYh5cUVPGr9oky7iTqKoUrUd7Cmsap68XFaNgoWTsMCygC 4aMsxC20r89EMUu+rpfy6vOHDnZscFScr9/TCxjHCjW4OHaVAFLDUFUfw1Yd+29yfYGY3P hGputy9cZOqyUfnA5W2Ra0fEDCyQMytg2lVjTiS0hlqOsVFrUwTF/ZgF700YcQ== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4W36gb3fZ1zc3x; Tue, 18 Jun 2024 00:14:19 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 45I0EJ1E082854; Tue, 18 Jun 2024 00:14:19 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 45I0EJMH082851; Tue, 18 Jun 2024 00:14:19 GMT (envelope-from git) Date: Tue, 18 Jun 2024 00:14:19 GMT Message-Id: <202406180014.45I0EJMH082851@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: "Danilo G. Baio" Subject: git: 2169a9f675 - main - website/news/newsflash: Fix GNOME link List-Id: Commit messages for all branches of the doc repository List-Archive: https://lists.freebsd.org/archives/dev-commits-doc-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-doc-all@freebsd.org Sender: owner-dev-commits-doc-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: dbaio X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 2169a9f6755def450b31e5579dd1f5be3c6b0334 Auto-Submitted: auto-generated The branch main has been updated by dbaio: URL: https://cgit.FreeBSD.org/doc/commit/?id=2169a9f6755def450b31e5579dd1f5be3c6b0334 commit 2169a9f6755def450b31e5579dd1f5be3c6b0334 Author: Danilo G. Baio AuthorDate: 2024-06-18 00:09:15 +0000 Commit: Danilo G. Baio CommitDate: 2024-06-18 00:09:15 +0000 website/news/newsflash: Fix GNOME link Previously, it was being redirected through nginx. --- website/content/en/news/newsflash.adoc | 2 +- website/content/zh-tw/news/newsflash.adoc | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/website/content/en/news/newsflash.adoc b/website/content/en/news/newsflash.adoc index 4893085d41..f09933e814 100644 --- a/website/content/en/news/newsflash.adoc +++ b/website/content/en/news/newsflash.adoc @@ -14,7 +14,7 @@ FreeBSD is a rapidly developing operating system. Keeping up on the latest devel The following projects have their own news pages, which should be checked for project specific updates. * https://freebsd.kde.org/[KDE on FreeBSD] -* link:../../gnome[GNOME on FreeBSD] +* link:../../gnome/[GNOME on FreeBSD] For a detailed description of past, present, and future releases, see the link:../../releases[Release Information page]. diff --git a/website/content/zh-tw/news/newsflash.adoc b/website/content/zh-tw/news/newsflash.adoc index 54187878ae..67e266727b 100644 --- a/website/content/zh-tw/news/newsflash.adoc +++ b/website/content/zh-tw/news/newsflash.adoc @@ -14,7 +14,7 @@ FreeBSD 是個發展迅速的作業系統。 保持最新的開發版是比較 下列的每項都有自己的新聞頁面,裡面有這些的更新細節。 * https://freebsd.kde.org/[FreeBSD 上的 KDE] -* link:../../gnome[FreeBSD 上的 GNOME] +* link:../../gnome/[FreeBSD 上的 GNOME] 更詳細的描述、介紹、和未來的發行版本,請看 link:../../releases[Release 資訊]這頁。 From nobody Tue Jun 18 19:50:17 2024 X-Original-To: dev-commits-doc-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4W3cmV1ks4z5PMHb for ; Tue, 18 Jun 2024 19:50:18 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4W3cmV15tRz49r0; Tue, 18 Jun 2024 19:50:18 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718740218; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=zyqYtB+HPTbAXPvWoSV4+DBbz8Tqo2y0M+TqIglSs9k=; b=AjFuzZAldzsBjtjxRo8LUcq2rmhbvC+wiOTB8LhrJARtjHEV/hj9AeLqNuTahrvkX1dT6C QA0rUs3oqTbQOAK5OBQv1rTtn1abwkCTwdf5+KO9D+MhYL76RcGQA+EKMsX64sJ21QuHRS n57SQf2qHB42zSE6b/8fXXfuKfjN+99HEDS6mfoxPWWcG8pg31J0NMHto/LLhSUhtXsVxH MWfqrAW4V/4lLEXCBZ7IDVunzw6krHKUsSoszKkhhKd8Mj1UWWTAK8DF9LDkH8+7dUEu+e gjRVIjIVmH551s0t4scfwTpjMqP4d9idx2WbL9fh/wea7JHsVFZelD1GwF1vGg== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1718740218; a=rsa-sha256; cv=none; b=xjQqbnJH0QWkqr9EYv7VjwYKofMOQmx/ZbxEd8yleDYYIih4q/qDeY/QlpBn708uDmz+gB UjkjNpWbhCEZAqkql4b/DdkNAn8mpNsEHMhgpUzVz92jevizgq7gzVdSbueTmHs0WsHJyt WkfzX7egJhDFCceQ5leYXVfFd1t8230VmnSwy8ULyysBj7NRDW9CPNHAISLv03bwfTLdil u7+KZSJ7usreW3MFmYU5Cbyq8yZNiUIFUtwfJFpCeywk++P90bcTMqLkFzOSvPP/insF/g oUOs/a3tbqs5f1Ft1BXX8P6RTdDr6Q54ERCHq9GroXfb+cPJ4TcqY5VhemNYsA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718740218; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=zyqYtB+HPTbAXPvWoSV4+DBbz8Tqo2y0M+TqIglSs9k=; b=bjiLYnndsUYMnmw5Jc3Kq3IjGjfRQqpm1kYGEk0TUrnZUzQvAMk5nFDoR/NKE7BqLKGqJF WlgLZsg97WcQn2RIelbRM9ZBBWvvK/MpIFUW8Ha5CG5oTGbNV9Uu23OlcCI54jCmrpC+p+ tloYij0yDboRZc3elxQtEI2emRHCxpH5hxNfGdb/mwPk9fWyG5rLvLHr1Esa9Fdo9Cwwk/ h6MttHgvkU8X15sa8P9pHTxAg82EjBOAcXBKcqBzdR8o6TLADwfvRMKiqAo2ojCk6SS28X 6Gif6Iy6PVjL7ulM0fYV7bXOx77cm1qsRKJXH44lqibGL2a4kbkfmRHbNZUjJA== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4W3cmV0jB6z1BDR; Tue, 18 Jun 2024 19:50:18 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 45IJoH0i087533; Tue, 18 Jun 2024 19:50:17 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 45IJoHDK087530; Tue, 18 Jun 2024 19:50:17 GMT (envelope-from git) Date: Tue, 18 Jun 2024 19:50:17 GMT Message-Id: <202406181950.45IJoHDK087530@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Li-Wen Hsu Subject: git: 3de414e22b - main - administration: Announce core.13 members List-Id: Commit messages for all branches of the doc repository List-Archive: https://lists.freebsd.org/archives/dev-commits-doc-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-doc-all@freebsd.org Sender: owner-dev-commits-doc-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: lwhsu X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 3de414e22b25e8504695f4cfa18be98423259d2b Auto-Submitted: auto-generated The branch main has been updated by lwhsu: URL: https://cgit.FreeBSD.org/doc/commit/?id=3de414e22b25e8504695f4cfa18be98423259d2b commit 3de414e22b25e8504695f4cfa18be98423259d2b Author: Li-Wen Hsu AuthorDate: 2024-06-18 19:42:17 +0000 Commit: Li-Wen Hsu CommitDate: 2024-06-18 19:42:17 +0000 administration: Announce core.13 members --- website/content/en/administration.adoc | 17 ++++++++--------- 1 file changed, 8 insertions(+), 9 deletions(-) diff --git a/website/content/en/administration.adoc b/website/content/en/administration.adoc index 7d336f199f..99fdae4e8f 100644 --- a/website/content/en/administration.adoc +++ b/website/content/en/administration.adoc @@ -57,15 +57,14 @@ This page lists teams, groups and individuals within the FreeBSD project with de The FreeBSD Core Team constitutes the project's "Board of Directors", responsible for deciding the project's overall goals and direction as well as managing specific areas of the FreeBSD project landscape. The Core Team is elected by the active developers in the project. -* {bapt} (Security Team Liaison) -* {bcr} (Foundation Liaison) -* {emaste} (Release Engineering Team Liaison) -* {grog} -* {jhb} (CI Team Liaison) -* {lwhsu} (Documentation Engineering Team Liaison) -* {manu} (Ports Management Team Liaison) -* {tcberner} (Cluster Administrators Team Liaison) -* {0mp} (Bugmeister Team Liaison) +* {allanjude} +* {dch} +* {glebius} +* {hrs} +* {lwhsu} +* {mat} +* {olivier} +* {tcberner} [[t-doceng]] == FreeBSD Documentation Engineering Team From nobody Wed Jun 19 09:45:33 2024 X-Original-To: dev-commits-doc-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4W3zJF5n7Mz5PJFc for ; Wed, 19 Jun 2024 09:45:33 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4W3zJF563Xz4H9H; Wed, 19 Jun 2024 09:45:33 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718790333; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=KsUG3hrLJf2itPkMdXeNUrPsg5hm6oL9901cOYGJhpw=; b=R2+6j+XF0HBZ3hfXwASXqITmVg9gXuCULKVITcPFdFhAU33A89yW8CtRvz5fLlGv93hh8V siBVAUPp0+KHRf0I73ZJWe8bQwG4ke7Hxpp0K2Wo1GFesHFt71KT3sSG7aD6i5MnopZvnk SiBDxA2ex44mCYOVqCBzamr0qHWtwVutVDQtQBMURK5D42lUHgDbpv7r9SuURzREmwO2CU CJc8fboB6U8UJsWajoR9yGC8qQIeAKbKgtld7ShKUcZ1TltIcFdQnlA3hXO/VT25E6DysB IsUWV20WkF/Wc5pkFUBX6uBI3PrjR7j5gF5fr24jWvZW7VQI83w6/RuCONpYLA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1718790333; a=rsa-sha256; cv=none; b=hzRDdp6HavHbuIP5mdi9x9PJU6PEJnS1tfvuPqAe+pPCtj0QC/Zv3cikS5I2z8kZ8XMTht N08CwrWGojLkkKpNQ4TKNb+MlEOUI4ZZrUhVPTbyH8283zMqXCM4+dhg7BVl3mua4VEaGf cY3iI01GRyQHUkY5x8euNahlqxxqAUUradj0B1yeeiWTSLygtCboWVEiI5R5zK1gEsPx/u rQ30vhqHwq5VCk0ZduClIIkRJjIfnaFxWCGKQXjHmVmnsOZdDqcdQwOyIWNxecuyR0FWqD cmiA6EJDTieXsv9E4QtU6gKYYSEBl7FG8kuvfxE3ZpfQ1foZbWkGSyYirbqQOw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718790333; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=KsUG3hrLJf2itPkMdXeNUrPsg5hm6oL9901cOYGJhpw=; b=RFtQBF3TU5h+Nz3GVjv9J5U47sNSd3T0q2lFnGKkrgSYyUBsDBOXeUascQJ/3d7Dcf8G6p dci1yom2uLrb7GwzbWaQfYN4wYFQoyzeAam7bnRAAWJvt9DQSjYsY8UjPpc9TDRB3cC3eA kKX/Y+T9W37/bflWsEe/0XJzI6lwgjRDFYamFLg605zS72WTjb4/2E2aMNlWdlDT7OWz/z HcDKHdDFuQMgBKP/eqvGoaq/vQEIi7a6V1VRujnCyyzjlk7pcRaZHbA4l0LLLfdeCU/U1j efdT4P4FULvr3YZ5AXz0d3T5p4dO+iQAAG4e0reEsoQ50OK3C00l4um0yEf5mA== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4W3zJF4jL0zcx7; Wed, 19 Jun 2024 09:45:33 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 45J9jXMt096957; Wed, 19 Jun 2024 09:45:33 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 45J9jXlO096954; Wed, 19 Jun 2024 09:45:33 GMT (envelope-from git) Date: Wed, 19 Jun 2024 09:45:33 GMT Message-Id: <202406190945.45J9jXlO096954@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Lorenzo Salvadore Subject: git: d5c23e47d8 - main - Status/2024Q2/service-jails.adoc: Add report List-Id: Commit messages for all branches of the doc repository List-Archive: https://lists.freebsd.org/archives/dev-commits-doc-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-doc-all@freebsd.org Sender: owner-dev-commits-doc-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: salvadore X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: d5c23e47d838798e2c8b44450b38456019c09ae0 Auto-Submitted: auto-generated The branch main has been updated by salvadore: URL: https://cgit.FreeBSD.org/doc/commit/?id=d5c23e47d838798e2c8b44450b38456019c09ae0 commit d5c23e47d838798e2c8b44450b38456019c09ae0 Author: Alexander Leidinger AuthorDate: 2024-06-19 09:43:23 +0000 Commit: Lorenzo Salvadore CommitDate: 2024-06-19 09:44:42 +0000 Status/2024Q2/service-jails.adoc: Add report Reviewed by: status (Pau Amma ) --- .../report-2024-04-2024-06/service-jails.adoc | 23 ++++++++++++++++++++++ 1 file changed, 23 insertions(+) diff --git a/website/content/en/status/report-2024-04-2024-06/service-jails.adoc b/website/content/en/status/report-2024-04-2024-06/service-jails.adoc new file mode 100644 index 0000000000..0fec2ab32f --- /dev/null +++ b/website/content/en/status/report-2024-04-2024-06/service-jails.adoc @@ -0,0 +1,23 @@ +=== Service jails -- Automatic jailing of rc.d services + +Links: + +link:https://docs.freebsd.org/en/articles/rc-scripting/#rcng-service-jails[rc-article part for Service Jails] URL: link:https://docs.freebsd.org/en/articles/rc-scripting/#rcng-service-jails[] + +Contact: Alexander Leidinger + +Service jails extend the man:rc[8] system to allow automatic jailing of rc.d services. +A service jail inherits the filesystem of the parent host or jail, but uses all other limits of the jail (process visibility, restricted network access, filesystem mounting permissions, sysvipc, ...) by default. +Additional configuration allows inheritance of the IPs of the parent, sysvipc, memory page locking, and use of the bhyve virtual machine monitor (man:vmm[4]). + +The base system infrastructure and the basesystem rc.d services are committed to 15-current, and the handbook / rc article updates are committed to the documentation. +Next steps are to extend services in the ports collection to be able to make use of it. + +If you want to put e.g. nginx into a service jail and allow IPv4 and IPv6 access, simply change man:rc.conf[5] to have: +---- +nginx_svcj_options=net_basic +nginx_svcj=YES +---- + +While this does not have the same security benefits as a manual jail setup with a separate filesystem and IP/VNET, it is much easier to set up, while providing some of the security benefits of a jail like hiding other processes of the same user. + +Any testing and feedback (even as simple as "service X works in a service jail") is welcome. From nobody Wed Jun 19 20:55:52 2024 X-Original-To: dev-commits-doc-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4W4G9j03t0z5NpsC for ; Wed, 19 Jun 2024 20:55:53 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4W4G9h6l5Dz4S1d; Wed, 19 Jun 2024 20:55:52 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718830552; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=nW7Ou1ud0QWqfsn4bJujTYmIXUEBO8zh6zeP3N0tN1Q=; b=K+fENiMFtJPm+N0vM89iEo7F0slU6lu6E69Zcy6ENKKJHoiBEltVQ2u892r0CPrNPTLC6C NYpegbJwmE8kUPXdJ/9K6erX0GUE0JRvV+/DkT8TOvrI3dnPCHkdKmm/YrlJvM9OoSkzTq 9auCQ9jRiz1dwsTmJKFVhBnJ/Lr+mMEROResr7gOFZ0X1NT37+fG+qRGklxRDw39O6Ndmv zJPVGxGa/OGYJrZkSbUE6grQs2CnP3uxymu5aNTxkfXUKaUxihRnBc17ZXyo5NO4Bpjc1g xfnAEGf3OP36MQjeQxMAH+iReir1M9B3DpNggyAESVdW0RF6A1t9iOJxgOj9og== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1718830552; a=rsa-sha256; cv=none; b=nf/lo8th4iNyaF5KXysWSZJxxaAlLol6R6iMBt+IRGmy6qAPrkj1x8xNLLOnRBjHzVObXx 9W7h+dkUzxVKk4fCBj5huFFK+xs8zqA1li0k6TGoux9yIAmmzIo/l8KKEe13l0hkY0n/I5 BRHXnMoOMcBSBS/zlNwqQ/zxdYoMZF2xRHTxzWtYuLWTTYmoB5M032Q1oqHRcIBgGcKIkj 346bWdAgkhJrH9H/kGjb2gzyq7g0nDJO3et2RNXcWw5blPyToNzzWAjoCpmlL3RGRqU8tg SwWAaYP5RudkealyX+H5onnrn9fc943SwV8tqhvF5aEVomfUUZ7D933kEe9wnA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718830552; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=nW7Ou1ud0QWqfsn4bJujTYmIXUEBO8zh6zeP3N0tN1Q=; b=Xae02xgNb2IxWX8UDwevjHyITbNf4zQ8LuWe5N4gi/N5Sri84RiKTEDe2EHfDniiw2qr0m kpP/kYmGu8p//4oGzbxiVIW0wTycFu2qEPDs2YDWL0UwKQsM683y3HPBrvZ4LNV37jyrmh /9zwQs+wdRR4YCHSFlW5aGFqnS5IyI4duxbUh++6c1k5i4e9gjew5zjE7wUxijZkonP/xh XwRgWz0xPbON/NGHdM7hxoRPlB+zmiMHpnFIPycMbRKRfRqrB+AHjAV+OgEp5xrrhAOIqy WVqmxIA0Ja9MZP2LFBwx+pU3JqYjGL5prwHky/YWYDBDMdCdJQOXN4/UcdGK6Q== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4W4G9h6DrczxVt; Wed, 19 Jun 2024 20:55:52 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 45JKtqws035762; Wed, 19 Jun 2024 20:55:52 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 45JKtqCb035759; Wed, 19 Jun 2024 20:55:52 GMT (envelope-from git) Date: Wed, 19 Jun 2024 20:55:52 GMT Message-Id: <202406192055.45JKtqCb035759@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Gordon Tetlow Subject: git: ccb8730e4a - main - Add EN-24:10 through EN-24:13. List-Id: Commit messages for all branches of the doc repository List-Archive: https://lists.freebsd.org/archives/dev-commits-doc-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-doc-all@freebsd.org Sender: owner-dev-commits-doc-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: gordon X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: ccb8730e4a6c4fc35167f59327e9ce11247c2462 Auto-Submitted: auto-generated The branch main has been updated by gordon: URL: https://cgit.FreeBSD.org/doc/commit/?id=ccb8730e4a6c4fc35167f59327e9ce11247c2462 commit ccb8730e4a6c4fc35167f59327e9ce11247c2462 Author: Gordon Tetlow AuthorDate: 2024-06-19 20:54:36 +0000 Commit: Gordon Tetlow CommitDate: 2024-06-19 20:54:36 +0000 Add EN-24:10 through EN-24:13. Approved by: so --- website/data/security/errata.toml | 16 ++ .../security/advisories/FreeBSD-EN-24:10.zfs.asc | 130 +++++++++++++ .../security/advisories/FreeBSD-EN-24:11.ldns.asc | 152 +++++++++++++++ .../advisories/FreeBSD-EN-24:12.killpg.asc | 132 +++++++++++++ .../advisories/FreeBSD-EN-24:13.libc++.asc | 151 +++++++++++++++ website/static/security/patches/EN-24:10/zfs.patch | 10 + .../static/security/patches/EN-24:10/zfs.patch.asc | 16 ++ .../static/security/patches/EN-24:11/ldns.patch | 207 +++++++++++++++++++++ .../security/patches/EN-24:11/ldns.patch.asc | 16 ++ .../static/security/patches/EN-24:12/killpg.patch | 63 +++++++ .../security/patches/EN-24:12/killpg.patch.asc | 16 ++ .../static/security/patches/EN-24:13/libc++.patch | 16 ++ .../security/patches/EN-24:13/libc++.patch.asc | 16 ++ 13 files changed, 941 insertions(+) diff --git a/website/data/security/errata.toml b/website/data/security/errata.toml index 702576a943..885339ab1d 100644 --- a/website/data/security/errata.toml +++ b/website/data/security/errata.toml @@ -1,6 +1,22 @@ # Sort errata notices by year, month and day # $FreeBSD$ +[[notices]] +name = "FreeBSD-EN-24:13.libc++" +date = "2024-06-19" + +[[notices]] +name = "FreeBSD-EN-24:12.killpg" +date = "2024-06-19" + +[[notices]] +name = "FreeBSD-EN-24:11.ldns" +date = "2024-06-19" + +[[notices]] +name = "FreeBSD-EN-24:10.zfs" +date = "2024-06-19" + [[notices]] name = "FreeBSD-EN-24:09.zfs" date = "2024-04-24" diff --git a/website/static/security/advisories/FreeBSD-EN-24:10.zfs.asc b/website/static/security/advisories/FreeBSD-EN-24:10.zfs.asc new file mode 100644 index 0000000000..28b188812c --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-24:10.zfs.asc @@ -0,0 +1,130 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-24:10.zfs Errata Notice + The FreeBSD Project + +Topic: Kernel memory leak in ZFS + +Category: core +Module: openzfs +Announced: 2024-06-19 +Affects: FreeBSD 14.1 +Corrected: 2024-06-17 14:35:24 UTC (stable/14, 14.1-STABLE) + 2024-06-19 20:36:48 UTC (releng/14.1, 14.1-RELEASE-p1) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +ZFS is an advanced and scalable file system originally developed by Sun +Microsystems for its Solaris operating system. ZFS was integrated as part of +the FreeBSD starting with FreeBSD 7.0, and it has since become a prominent +and preferred choice for storage management. + +II. Problem Description + +When writing data to a file on ZFS, the kernel may need to handle soft +page faults that can occur when accessing user data. When doing so, in +some cases ZFS needs to undo an earlier kernel buffer allocation. A bug +in the handling of these cases causes this buffer to be leaked. + +III. Impact + +The leaked kernel memory is effectively lost and cannot be reused for +other purposes. Some workloads may trigger the leak frequently, +eventually requiring a reboot of the system. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, +or the i386 platform on FreeBSD 13, can be updated via the freebsd-update(8) +utility: + +# freebsd-update fetch +# freebsd-update install +# reboot + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-24:10/zfs.patch +# fetch https://security.FreeBSD.org/patches/EN-24:10/zfs.patch.asc +# gpg --verify zfs.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +This issue is corrected as of the corresponding Git commit hash in the +following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/14/ 1c27279ed22d stable/14-n267965 +releng/14.1/ f566b7eb8d94 releng/14.1-n267680 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat + +Or visit the following URL, replacing NNNNNN with the hash: + + + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmZzRTcACgkQbljekB8A +Gu+zUQ/+IiSe/HQFSKrBwIxBxnlFQfTjNq02f14TPZghCTxNCWdGXXD6QR2d8ydZ +bfryBwVsnnU3WlCPs6kyJfIlSp9vH2hqRJ+N5VyDvGkBUpWaGm0+ps5LGTQbGR8O +ig/kIuRzNO0Mqi42MIse6UvozLAuahYA6sQ3nn6j/4grV7jiuxDCrfmfBOMLgN4D +LZ87ApJM09lT2pe8x7hZBxk8wJKf6cWvpBjNh+zwPLc+oMvvIPkqiMjuy7ni7f/5 +K/GDf4i3XgTf9pdPAwLNZoTNb7UebKzRGWlxmdOie6FUDHIuEwoJledmhbOmH91G +PKtHx2skFVKKtFXgfMGraK5FBpwkoJbIo1uCUamEoo4cGMGR92ErP/MVa6MsIs3Z +pLq1M/eN9aYQHCogb1uirQVZAutJhNJ9QsQo0rBJNgLE9l1UPnSIJ6CLpW83nY1f +8eedQKyfwMYL5jivH/aKEsd/vzqInAiFU55oO64OPvgKv3pj3TgIECoc9kfdfXc7 +VR2yfNy8CKd/exb+CRqgeJGT8LaL2Wy66pUd9usIc/mNola8ce0uuPDc0703b5ob +xfCorrd3gRhNB+Od3wrs4p7tzwqndfo5882w9EXEhuhubfft9voRTzpDvSe0y3ib +YPY6EnHWSYAP56+f/shnworMxYtYrUipBYQVYxLBBtdV7DsYuKo= +=YxSw +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-EN-24:11.ldns.asc b/website/static/security/advisories/FreeBSD-EN-24:11.ldns.asc new file mode 100644 index 0000000000..0c58c2d9f0 --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-24:11.ldns.asc @@ -0,0 +1,152 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-24:11.ldns Errata Notice + The FreeBSD Project + +Topic: LDNS uses nameserver commented out in resolv.conf + +Category: contrib +Module: ldns +Announced: 2024-06-19 +Credits: Michael Gmelin + Dag-Erling Smørgrav +Affects: FreeBSD 13.3 and FreeBSD 14.0. +Corrected: 2024-05-20 09:04:54 UTC (stable/14, 14.0-STABLE) + 2024-06-19 20:36:59 UTC (releng/14.0, 14.0-RELEASE-p7) + 2024-05-20 09:04:59 UTC (stable/13, 13.3-STABLE) + 2024-06-19 20:37:08 UTC (releng/13.3, 13.3-RELEASE-p3) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +LDNS is a DNS library that facilitates DNS tool programming. + +II. Problem Description + +Due to a bug in the library's configuration file parser, commented out +configuration settings in /etc/resolv.conf were picked up by the LDNS +resolver, potentially leading to malfunction and/or information leakage. + +This included, but was not limited to, the nameserver setting. Given +this example + + # /etc/resolv.conf + + # nameserver 8.8.8.8 + nameserver 127.0.0.1 + +DNS requests were sent to the commented out external resolver instead +of the local one. + +III. Impact + +Programs using the LDNS library might behave in unexpected ways. Name +resolution could be inconsistent with what other tools which use libc +return, e.g., `ping` vs. `host`. DNS request containing private +information could leak to third parties. A system's attack surface is +increased. + +Affected tools include host(1), drill(1), and ssh(1), which uses +LDNS in the VerifyHostKeyDNS feature to fetch SSHFP records. + +IV. Workaround + +Removing empty lines from /etc/resolv.conf mitigates the problem: + + sed -i '' '/^[[:space:]]*$/d' /etc/resolv.conf + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, +or the i386 platform on FreeBSD 13, can be updated via the freebsd-update(8) +utility: + +# freebsd-update fetch +# freebsd-update install + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-24:11/ldns.patch +# fetch https://security.FreeBSD.org/patches/EN-24:11/ldns.patch.asc +# gpg --verify ldns.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart all daemons that use the library, or reboot the system. + +VI. Correction details + +This issue is corrected as of the corresponding Git commit hash in the +following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/14/ 7daf36028411 stable/14-n267742 +releng/14.0/ bdf75e830a77 releng/14.0-n265418 +stable/13/ e95e16191f63 stable/13-n257915 +releng/13.3/ d45cf1d2f124 releng/13.3-n257434 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat + +Or visit the following URL, replacing NNNNNN with the hash: + + + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmZzRTkACgkQbljekB8A +Gu9BYBAApSQZbv3wgT5PhJRsaCulmOZOH5gywlVdaBA1I4sDF3on0CFwLQfy7lLH +q2xFEfll5vBVbfGCVp2zVBgb4IyknqMgf8Ae4uBEEJJejRgxxnFTnQmdlzg7a8TR +9UW3g6QB/5tUIGrxFqIdx4qRAQz1ie6NwR+KvP8ojXk0xVscKIaijXACbmAgT6nH +HygG7snrB9VmMMlRIHYhoarhRBd+aX68Jg3F+yGUX76FB4HVMSFMYo0fEWgi7SQ3 +psZfq54GvCH+kSvYduXS3QkTJ7N/S9p6JAVraRlJmFnjQ69qE7u59bc68zW0D2pn +Pj6/c0OZtWE2SQGqCuqgnBffjArisAJ/BKiK/XeO8B1fSvaVKJToR18+6KGTmc0f +nnqQLxFeGbh5gHHcM8QaLBJFUgm5TVvdevcDmLuiVMSvQyt5iC6rIGwb3UNYAnW7 +w/UFSresVKppsB2JDqyGjaSf2FI00rYIKHChZ8nkKYPMhb6V/TJZr3k25/3idbvi +6zO7wfbOhwAYQ44Mg/gY/v206qpoYiZO2tMQazbiicOqBOQBYWdXsojYhCB6qkyU +++kBNAMugpOAsDkIvN9mWLniRnvycrbEqthQlmfR7X3tZRiuz+0S1alx03Z5VsP6 +zM5//i6W2Lt8DmX34zQDeQAMTZXD3bG1JSe2UbKyZkL20vrSTfg= +=lQUa +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-EN-24:12.killpg.asc b/website/static/security/advisories/FreeBSD-EN-24:12.killpg.asc new file mode 100644 index 0000000000..eac987cede --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-24:12.killpg.asc @@ -0,0 +1,132 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-24:12.killpg Errata Notice + The FreeBSD Project + +Topic: Lock order reversal in killpg causing livelock + +Category: core +Module: kern +Announced: 2024-06-19 +Credits: Peter Holm + Konstantin Belousov + Michael Gmelin +Affects: FreeBSD 13.3 +Corrected: 2024-05-22 23:47:55 UTC (stable/13, 13.3-STABLE) + 2024-06-19 20:37:09 UTC (releng/13.3, 13.3-RELEASE-p3) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +killpg(2) is a system call that sends signals to process groups. +In order to prevent race conditions with the fork(2) system call, +locking is required. + +II. Problem Description + +The code designed to prevent lock order reversals between killpg(2) +and fork(2) did not wait for lock availability before retrying to +acquire a lock, which could result in a livelock causing very high +system load. + +III. Impact + +Affected machines are practically unusable. They recover if the +processes causing the load are killed. + +IV. Workaround + +No workaround is available. Systems that fork a lot are more likely to +to hit this problem. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, +or the i386 platform on FreeBSD 13, can be updated via the freebsd-update(8) +utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10m "Rebooting for a stability patch" + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-24:12/killpg.patch +# fetch https://security.FreeBSD.org/patches/EN-24:12/killpg.patch.asc +# gpg --verify killpg.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +This issue is corrected as of the corresponding Git commit hash in the +following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/13/ cd73b38955f6 stable/13-n257926 +releng/13.3/ eb410545d00d releng/13.3-n257435 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat + +Or visit the following URL, replacing NNNNNN with the hash: + + + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmZzRTsACgkQbljekB8A +Gu9uEA//cITydBAKrRYsf6xP1z/tDmKR3DqAkQYYytFGFI35lsvM6iN77wq5QFW4 +5i1nVS1+YMPINlI9jXCfgoEsA8KAC2l8untSKHRh0uR8TzFak6BWTjbnCBFYd1K/ +I0bnc38FeRDjMEPyCDmiq26aU7WZ0Ftjb5mgf0PUn09pX9hP8/MXa1FTxkwyWq5Y +9RZXNXUSAEug9+uCgJqzl4CiYzqbaxHZ3ich6Erd955gDb72LwxHHkWiq0ADi35K +d0C8LipwtpKCYoo1dfXkLnoPo0loDt18pzSIx0svmUQinlipfwSbGxuZ31NiLLgE +bEzc6OFhV1D0WhIxM8z+kunTmWAY5/Uo5YHARulD406SS27GWp0s8fEbnN4rcnPG +m5cPNQYXemBjRB2LnqoocgczkEHNVHr+ZuN3/mPSadS/m4llavj8xqGlrdDB1eLT +LCkSSnF/4kBLZyHO7C5hJHQseRoWpLd/hR+h4Q/nnTsU2mbelhFm0C297mPWpt+D +8RHxOshrA8WryQCVEqJmC63bmA3MtmqyuMhpi3+c4Iy4bvj2GKGcdsB0E4JugbMf +5zg+muywBmIQMYIIFrdRN0i3BW8y6KPvgokoBPUfnCsdS65WWlLBQLxKpfDHCkzl +juEZY5CUGvBnc3eFtLOzEvriFY7tAhephW0ZSal0wMyHw2NbE7E= +=5wI2 +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-EN-24:13.libc++.asc b/website/static/security/advisories/FreeBSD-EN-24:13.libc++.asc new file mode 100644 index 0000000000..53eacbcba6 --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-24:13.libc++.asc @@ -0,0 +1,151 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-24:13.libc++ Errata Notice + The FreeBSD Project + +Topic: Incorrect size passed to heap allocated std::string delete + +Category: contrib +Module: libc++ +Announced: 2024-06-19 +Affects: FreeBSD 14.1 +Corrected: 2024-06-07 07:29:25 UTC (stable/14, 14.1-STABLE) + 2024-06-19 20:36:50 UTC (releng/14.1, 14.1-RELEASE-p1) + 2024-06-07 07:29:30 UTC (stable/13, 13.3-STABLE) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +libc++ is an implementation of the C++ Standard Library, provided by the LLVM +project. It is used by C++ programs in the base system, and also by many C++ +programs in the ports collection. + +II. Problem Description + +C++14 and later supports size-aware deletion of heap objects, when the compiler +is able to determine at compile time what the exact size of a particular object +is. For this purpose, there are specific variants of "operator delete" that take +an additional size_t argument. If such a variant is called, the size is passed +through to the underlying allocator, which can optionally utilize this size for +for more efficient deallocation. + +A recent change in libc++'s implementation of std::string has introduced a +potential mismatch between the actual size allocated on the heap for the +contained string, and the size that is passed to "operator delete" when the +string is eventually destroyed. + +III. Impact + +The default allocator in FreeBSD does not leverage the size_t argument and is +unaffected. + +When std::string objects of a known size are deleted, and the size passed +through to the deallocation function does not match the actual size on the heap, +the underlying allocator can potentially produce unexpected results. In case of +allocators that are used for heap debugging or profiling, such as with Google's +gperftools (aka tcmalloc) this can lead to runtime warnings about incorrect +deallocations. + +IV. Workaround + +No workaround is available. Systems using the default memory allocator are +not affected. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, +or the i386 platform on FreeBSD 13, can be updated via the freebsd-update(8) +utility: + +# freebsd-update fetch +# freebsd-update install + +No reboot is necessary, but programs compiled against the old version of the + header should be rebuilt to fully fix the problem. + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-24:13/libc++.patch +# fetch https://security.FreeBSD.org/patches/EN-24:13/libc++.patch.asc +# gpg --verify libc++.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +No reboot is necessary, but programs compiled against the old version of the + header should be rebuilt to fully fix the problem. + +VI. Correction details + +This issue is corrected as of the corresponding Git commit hash in the +following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/14/ 55c5dad2f305 stable/14-n267917 +releng/14.1/ 8e0e6b428cb8 releng/14.1-n267681 +stable/13/ ef4d145057c1 stable/13-n257958 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat + +Or visit the following URL, replacing NNNNNN with the hash: + + + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmZzRT0ACgkQbljekB8A +Gu/HpQ//Xkz6NMBUg4CdmV1ElSP+dTUfh8YpNfD/X//4RgngKoz9DKt6CM78KSWI +68JfNrn6XRGdhjG0Mn/YvRCe8xzGBGpvcd1lcun7mAw5yqpsbSAUKvFmywjX+oxs +bQpCJRloBLZJE6NoZgBmhw2K2HzfmvApPin3TjLGa/u/ovsK+pD7SvDynbR5VsxH +Bey21H2+3LOqyBPaiTe6ccJ4JXCOX9+oAK5byhMLPrnRqLyvh3IV2jttWurbtNki +nFMYhqoBq6cWoAba3gVD0ZM7S5C+P5VDeMMIBOPKQVRwIl9eDS/UKICXrMbaMNqL +002egG7Oia22H0dpYuYX6dl7cAtn/M3NcBEwDDvqNuHncbGVeaYA8qXHAh+eeA3R +gBK2NkltdDvZbk8Uv9hgHwIrdJyENhWGoT1OQ1JqgaIKo7tIvlhIA/HtpTygeyMA +F/TgFvg+K42/kWQ/N1UTwUFbEH6jgDu1BGTZzkMMyQf3rymdQ1VM6Z1p7dxppVI7 +uw2+80BePzDbnV9naXMzlhr/YjYgytRRQFbVR2ZlPM+rEGyfMAM/XvtCWfdlstwY +3bZXo/vPRZPXg/sd/AFEKqIiz1ZvVTJroMUCnnDvsDKcRzAHgIIHfMK1mMpSizna +LNDS/vvyQszgINWPUMZOZaALQzUY9SAmm0eNqIz3uV4o0qM6DQE= +=7Qxx +-----END PGP SIGNATURE----- diff --git a/website/static/security/patches/EN-24:10/zfs.patch b/website/static/security/patches/EN-24:10/zfs.patch new file mode 100644 index 0000000000..10cc6dc682 --- /dev/null +++ b/website/static/security/patches/EN-24:10/zfs.patch @@ -0,0 +1,10 @@ +--- sys/contrib/openzfs/module/zfs/dbuf.c.orig ++++ sys/contrib/openzfs/module/zfs/dbuf.c +@@ -2840,6 +2840,7 @@ + failed = B_FALSE; + } else if (failed) { + VERIFY(!dbuf_undirty(db, tx)); ++ arc_buf_destroy(db->db_buf, db); + db->db_buf = NULL; + dbuf_clear_data(db); + DTRACE_SET_STATE(db, "fill failed"); diff --git a/website/static/security/patches/EN-24:10/zfs.patch.asc b/website/static/security/patches/EN-24:10/zfs.patch.asc new file mode 100644 index 0000000000..a601f3e9ba --- /dev/null +++ b/website/static/security/patches/EN-24:10/zfs.patch.asc @@ -0,0 +1,16 @@ +-----BEGIN PGP SIGNATURE----- + +iQIzBAABCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmZzRTgACgkQbljekB8A +Gu86Lw//bYytQzAfOOGO1h03/l0QCiaz8jcekW3DVG0Lfl8mYVumlbzCRxOsXGox +hzNonjnEOu8h7ShJURFu+RvmZ+dYG9i6nsXZeqO6bE8unktnpLGpvO64oSuYObPk +NLGx6uVKdlf9c1niYzydKcLOWtQG6OA2jZOl4WPadQsrdsf3MpQ94aQWxQYV7GwY +FhVlfFDsMFP35a6MWtnQCRmsIQUcMGSIiUkmvgfdEALoaf5pfUI8Dri9TR7ePfm9 +dfmtnyC7FTA/i8K+VdqURl/pKdAVtkpfv8OAk79Jgi77If5/+0prpC8M7kgbCq3o +z8vOjcRkmdJO0ckflcR9onpyHSB9MK8f0aZl+a0+4ED7HiFFcB0JsnPjw16KjsEz +qv0tur7HhBcdjIvKX9jZNx67yMtXMiLCTbK0s2fW/3y7uKkonyKiZxJf7RN05ft2 +KfPMWwUv1uq70V0gyo+cwYzrEbucQTl63fCwt8E71DL24mrPTWYHm0Ags1qM+zgn +OeVdycKVEmZTnbSkFhyfu9Wqle0OOY0dzmKUd5qOR3U/C9XoB6r3G6Jw/tDHqBH+ +dfWF2LcTOvVGmFB2T8I/R6+hgIZ33e3J3u/Pc7xDWuzbubwfoBPQ4/MJ3aditBb2 +ev04cADlvm2MUnEHjZZJxTUQjgQRcz/1trzOeMpwezGhaxs1ZTo= +=8kFd +-----END PGP SIGNATURE----- diff --git a/website/static/security/patches/EN-24:11/ldns.patch b/website/static/security/patches/EN-24:11/ldns.patch new file mode 100644 index 0000000000..4faad85808 --- /dev/null +++ b/website/static/security/patches/EN-24:11/ldns.patch @@ -0,0 +1,207 @@ +--- contrib/ldns/ldns/parse.h.orig ++++ contrib/ldns/ldns/parse.h +@@ -95,6 +95,8 @@ + */ + ldns_status ldns_fget_token_l_st(FILE *f, char **token, size_t *limit, bool fixed, const char *delim, int *line_nr); + ++ssize_t ldns_fget_token_l_resolv_conf(FILE *f, char *token, const char *delim, size_t limit, int *line_nr); ++ + /** + * returns a token/char from the buffer b. + * This function deals with ( and ) in the buffer, +--- contrib/ldns/parse.c.orig ++++ contrib/ldns/parse.c +@@ -27,9 +27,14 @@ + return ldns_fget_token_l(f, token, delim, limit, NULL); + } + +-ldns_status +-ldns_fget_token_l_st(FILE *f, char **token, size_t *limit, bool fixed +- , const char *delim, int *line_nr) ++enum file_type2parse { ++ zone_file_type, resolv_conf_file_type ++}; ++ ++static ldns_status ++ldns_fget_token_l_st_file_type(FILE *f, char **token, size_t *limit, ++ bool fixed, const char *delim, int *line_nr, ++ enum file_type2parse file_type) + { + int c, prev_c; + int p; /* 0 -> no parentheses seen, >0 nr of ( seen */ +@@ -98,7 +103,9 @@ + } + + /* do something with comments ; */ +- if (c == ';' && quoted == 0) { ++ if ((c == ';' ++ || (c == '#' && file_type == resolv_conf_file_type)) ++ && quoted == 0) { + if (prev_c != '\\') { + com = 1; + } +@@ -215,6 +222,26 @@ + return i == 0 ? LDNS_STATUS_SYNTAX_EMPTY : LDNS_STATUS_OK; + } + ++ldns_status ++ldns_fget_token_l_st(FILE *f, char **token, size_t *limit, bool fixed ++ , const char *delim, int *line_nr) ++{ ++ return ldns_fget_token_l_st_file_type( ++ f, token, limit, fixed, delim, line_nr, zone_file_type); ++} ++ ++ssize_t ++ldns_fget_token_l_resolv_conf(FILE *f, char *token, const char *delim, ++ size_t limit, int *line_nr) ++{ ++ if (limit == 0) ++ limit = LDNS_MAX_LINELEN; ++ if (ldns_fget_token_l_st_file_type(f, &token, &limit, true, delim, ++ line_nr, resolv_conf_file_type)) ++ return -1; ++ else ++ return (ssize_t)strlen(token); ++} + + ssize_t + ldns_fget_token_l(FILE *f, char *token, const char *delim, size_t limit, int *line_nr) +--- contrib/ldns/resolver.c.orig ++++ contrib/ldns/resolver.c +@@ -775,7 +775,7 @@ + #endif + ssize_t gtr, bgtr; + ldns_buffer *b; +- int lnr = 0, oldline; ++ int lnr = 0; + FILE* myfp = fp; + if(!line_nr) line_nr = &lnr; + +@@ -809,36 +809,18 @@ + + gtr = 1; + word[0] = 0; +- oldline = *line_nr; + expect = LDNS_RESOLV_KEYWORD; + while (gtr > 0) { +- /* check comments */ +- if (word[0] == '#') { +- word[0]='x'; +- if(oldline == *line_nr) { +- /* skip until end of line */ +- int c; +- do { +- c = fgetc(myfp); +- } while(c != EOF && c != '\n'); +- if(c=='\n') (*line_nr)++; +- } +- /* and read next to prepare for further parsing */ +- oldline = *line_nr; +- continue; +- } +- oldline = *line_nr; + switch(expect) { + case LDNS_RESOLV_KEYWORD: + /* keyword */ +- gtr = ldns_fget_token_l(myfp, word, LDNS_PARSE_NORMAL, 0, line_nr); ++ gtr = ldns_fget_token_l_resolv_conf(myfp, word, LDNS_PARSE_NORMAL, 0, line_nr); + if (gtr != 0) { +- if(word[0] == '#') continue; + for(i = 0; i < LDNS_RESOLV_KEYWORDS; i++) { + if (strcasecmp(keyword[i], word) == 0) { + /* chosen the keyword and + * expect values carefully +- */ ++ */ + expect = i; + break; + } +@@ -856,16 +838,12 @@ + break; + case LDNS_RESOLV_DEFDOMAIN: + /* default domain dname */ +- gtr = ldns_fget_token_l(myfp, word, LDNS_PARSE_NORMAL, 0, line_nr); ++ gtr = ldns_fget_token_l_resolv_conf(myfp, word, LDNS_PARSE_NORMAL, 0, line_nr); + if (gtr == 0) { + if(!fp) fclose(myfp); + ldns_resolver_deep_free(r); + return LDNS_STATUS_SYNTAX_MISSING_VALUE_ERR; + } +- if(word[0] == '#') { +- expect = LDNS_RESOLV_KEYWORD; +- continue; +- } + tmp = ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME, word); + if (!tmp) { + if(!fp) fclose(myfp); +@@ -879,16 +857,12 @@ + break; + case LDNS_RESOLV_NAMESERVER: + /* NS aaaa or a record */ +- gtr = ldns_fget_token_l(myfp, word, LDNS_PARSE_NORMAL, 0, line_nr); ++ gtr = ldns_fget_token_l_resolv_conf(myfp, word, LDNS_PARSE_NORMAL, 0, line_nr); + if (gtr == 0) { + if(!fp) fclose(myfp); + ldns_resolver_deep_free(r); + return LDNS_STATUS_SYNTAX_MISSING_VALUE_ERR; + } +- if(word[0] == '#') { +- expect = LDNS_RESOLV_KEYWORD; +- continue; +- } + if(strchr(word, '%')) { + /* snip off interface labels, + * fe80::222:19ff:fe31:4222%eth0 */ +@@ -911,7 +885,7 @@ + break; + case LDNS_RESOLV_SEARCH: + /* search list domain dname */ +- gtr = ldns_fget_token_l(myfp, word, LDNS_PARSE_SKIP_SPACE, 0, line_nr); ++ gtr = ldns_fget_token_l_resolv_conf(myfp, word, LDNS_PARSE_SKIP_SPACE, 0, line_nr); + b = LDNS_MALLOC(ldns_buffer); + if(!b) { + ldns_resolver_deep_free(r); +@@ -929,10 +903,6 @@ + bgtr = ldns_bget_token(b, word, LDNS_PARSE_NORMAL, (size_t) gtr + 1); + while (bgtr > 0) { + gtr -= bgtr; +- if(word[0] == '#') { +- expect = LDNS_RESOLV_KEYWORD; +- break; +- } + tmp = ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME, word); + if (!tmp) { + ldns_resolver_deep_free(r); +@@ -954,28 +924,23 @@ + } + break; + case LDNS_RESOLV_SORTLIST: +- gtr = ldns_fget_token_l(myfp, word, LDNS_PARSE_SKIP_SPACE, 0, line_nr); ++ gtr = ldns_fget_token_l_resolv_conf(myfp, word, LDNS_PARSE_SKIP_SPACE, 0, line_nr); + /* sortlist not implemented atm */ + expect = LDNS_RESOLV_KEYWORD; + break; + case LDNS_RESOLV_OPTIONS: +- gtr = ldns_fget_token_l(myfp, word, LDNS_PARSE_SKIP_SPACE, 0, line_nr); ++ gtr = ldns_fget_token_l_resolv_conf(myfp, word, LDNS_PARSE_SKIP_SPACE, 0, line_nr); + /* options not implemented atm */ + expect = LDNS_RESOLV_KEYWORD; + break; + case LDNS_RESOLV_ANCHOR: + /* a file containing a DNSSEC trust anchor */ +- gtr = ldns_fget_token_l(myfp, word, LDNS_PARSE_NORMAL, 0, line_nr); ++ gtr = ldns_fget_token_l_resolv_conf(myfp, word, LDNS_PARSE_NORMAL, 0, line_nr); + if (gtr == 0) { + ldns_resolver_deep_free(r); + if(!fp) fclose(myfp); + return LDNS_STATUS_SYNTAX_MISSING_VALUE_ERR; + } +- if(word[0] == '#') { +- expect = LDNS_RESOLV_KEYWORD; +- continue; +- } +- + #ifdef HAVE_SSL + tmp_rr = ldns_read_anchor_file(word); + (void) ldns_resolver_push_dnssec_anchor(r, tmp_rr); diff --git a/website/static/security/patches/EN-24:11/ldns.patch.asc b/website/static/security/patches/EN-24:11/ldns.patch.asc new file mode 100644 index 0000000000..cbf6dd5acc --- /dev/null +++ b/website/static/security/patches/EN-24:11/ldns.patch.asc @@ -0,0 +1,16 @@ +-----BEGIN PGP SIGNATURE----- + +iQIzBAABCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmZzRToACgkQbljekB8A +Gu+/nBAArstsX30sRh4RTztlnK+YppF0LX6qdi5btBGcQeim3qeVrgDem8eblbxY +aN1rseaRjEai7KbgGzArC0w3wLOKC7fDwt5MPoPproqyb9bf03441GslGurA4hBW +NkCyHBCuXog1DkdWvu2YONiC7UPxoHAmBaRbE9IXMmCdsopZd+m0BqAOf3GO6Hem +XXXb0hzxBKQPS2qnnYF04OvYjitloG/Azsh0RBpRkYKhJXbypkTR+ZnfUTKke2V3 +SFu0pG2fDWc3rTQV3wY9ZezR9x4mtDuRXfupE5RLg53fI0XZzPdvLQ0FH4GfMN7E +KbRqMuNmpkhw+NQ7XoVl9h/+COZT75lU+WTGhO3/PH6qgzGnIZ8BAYqbbmWgYXsK +FuKWFFPQTJ5AdEaQdxe2GMCZ7/xLMpde9Bv95/s/s3NSRlj0M4SMUs+oVeiHZmQV +/S2v/EHVze9yuKszFY9ZVtm0Km+ejRc7+hBLWJ23buB1RKOepxIfTuuMxvW+V1X7 +8OcfmRIfw+iPayWyftYpWURkKJzrWE9NHrCLtXUqgGn+0zL33Sdh/JGg6UII9OJg +cccgev4/ohPDlZdmaKQfV37ukHO/ehdmVs6emGfqYgczTtNEvNY6uAeDWlHdZqrY +qSWVBtHuBbSi8j3u+BYj5iRZ4R5ZzS1aoyCR4uW28eFKOWhviWw= +=Yb9t +-----END PGP SIGNATURE----- diff --git a/website/static/security/patches/EN-24:12/killpg.patch b/website/static/security/patches/EN-24:12/killpg.patch new file mode 100644 index 0000000000..7b9134334b --- /dev/null +++ b/website/static/security/patches/EN-24:12/killpg.patch @@ -0,0 +1,63 @@ +--- sys/kern/kern_proc.c.orig ++++ sys/kern/kern_proc.c +@@ -587,8 +587,12 @@ + ("enterpgrp: session leader attempted setpgrp")); + + old_pgrp = p->p_pgrp; +- if (!sx_try_xlock(&old_pgrp->pg_killsx)) ++ if (!sx_try_xlock(&old_pgrp->pg_killsx)) { ++ sx_xunlock(&proctree_lock); ++ sx_xlock(&old_pgrp->pg_killsx); ++ sx_xunlock(&old_pgrp->pg_killsx); + return (ERESTART); ++ } + MPASS(old_pgrp == p->p_pgrp); + + if (sess != NULL) { +@@ -656,11 +660,18 @@ + ("%s: p %p belongs to pgrp %p", __func__, p, pgrp)); + + old_pgrp = p->p_pgrp; +- if (!sx_try_xlock(&old_pgrp->pg_killsx)) ++ if (!sx_try_xlock(&old_pgrp->pg_killsx)) { ++ sx_xunlock(&proctree_lock); ++ sx_xlock(&old_pgrp->pg_killsx); ++ sx_xunlock(&old_pgrp->pg_killsx); + return (ERESTART); ++ } + MPASS(old_pgrp == p->p_pgrp); + if (!sx_try_xlock(&pgrp->pg_killsx)) { + sx_xunlock(&old_pgrp->pg_killsx); ++ sx_xunlock(&proctree_lock); ++ sx_xlock(&pgrp->pg_killsx); ++ sx_xunlock(&pgrp->pg_killsx); + return (ERESTART); + } + +--- sys/kern/kern_prot.c.orig ++++ sys/kern/kern_prot.c +@@ -345,10 +345,8 @@ + error = EPERM; + } else { + error = enterpgrp(p, p->p_pid, newpgrp, newsess); +- if (error == ERESTART) { +- sx_xunlock(&proctree_lock); ++ if (error == ERESTART) + goto again; +- } + MPASS(error == 0); + td->td_retval[0] = p->p_pid; + newpgrp = NULL; +@@ -458,11 +456,11 @@ + error = enterthispgrp(targp, pgrp); + } + done: +- sx_xunlock(&proctree_lock); + KASSERT(error == 0 || newpgrp != NULL, + ("setpgid failed and newpgrp is NULL")); + if (error == ERESTART) + goto again; ++ sx_xunlock(&proctree_lock); + uma_zfree(pgrp_zone, newpgrp); + return (error); + } *** 66 LINES SKIPPED *** From nobody Fri Jun 21 18:05:05 2024 X-Original-To: dev-commits-doc-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4W5QHj5Gzwz5P4Q2 for ; Fri, 21 Jun 2024 18:05:05 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4W5QHj4ktDz4HB9; Fri, 21 Jun 2024 18:05:05 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718993105; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=mbcFBCiFhSJ1qg0XCGmpzUypdqtV0eu2WrDUvPuUhqs=; b=v9BGMlnnC5aS8mvq7c0Fkbos6HZ8BkLxEgLf0MfAnKlPR6+1lLGDgFaCm4wGAtTHSww0EY X8d3Urf3I6Q5onhQR4qK0eFZNV59ffj1i5nxFeaWQj68/2qpmO9p7yC8nz+VyJlmqupZs4 AiauEJnOFa4SRUlClb/AOr3vGjN9EROzFsO1EofYV1WEGL1NLaqPkV0r2zYkHiWGmVzPV2 b6wrHCCyBsUusFu9/Qt1IOSQLpXFJp4vQ7gyRupQsb0XgfQz2m4D6rRY599VT4PgeHaWSA LVQ8354tYdoKUJmJmuEMFr19nzjq3ZvQdmCSv05keA3ukH6GQrlvOGKks8AXdA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1718993105; a=rsa-sha256; cv=none; b=EvNK5JoQAHrE5O7kRscHJLe4zzaOtwOeaJoOW40WomGdVzL/rPq+y2uMLvoHgktEhDfyuK OVs/j9WLzYI5ko6cnOp97JsnzvSjKTiAaS/Gkj5u/zs7uxPTHh9ERDrTCq1hX2nuOzfVOk /0fH6WMw1Bhx1hrKswXmWowD0YBNNF113y7ziM5QHDknNoOzulhLmvIex/GUrGbkwvt3yr KuyX3T0KMjSnu+EDkmHq/VO7aktEZ3qEk+npQsmJU5iQfeqpUazMSf1rZwKm1JPLdROMJJ MTs23RnwHL8ClhQ3ifQ7lmbx9mPIUPVq39N7reV605pI105e/IWoIUpkU2RGXw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718993105; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=mbcFBCiFhSJ1qg0XCGmpzUypdqtV0eu2WrDUvPuUhqs=; b=mLsnfTqsv/6o+v7bBw1WDwqrDbIi4+rHpgwM0bFfrSp0Nk4ekymKGLA/tg7a2Ws/qDyoPY dAjQzT+GPLnTLcNa/Jrx8Rq1Kv5KEr4sTFthB1oEzUcHaUEP5XSfh8iiBK+i6sAbgLlFnP ziXUWkC/vHPUWKSD8HotDnAB1ktWHHcu2d7UAl77dO6cLJtG4qwTeHXeO6m8fEQ7gmvLiF b1eZGfN+ArgJ5472aL0qlgPlm8Ov0hmLIpwA/9dMu4F4Bgjcq9ORukVohBxYZq08YW0sMq 9pINhkMZXv1eCaXHmlAnnqRGbafOAcUF7e5qfX1o4Cl9DpFtOkhbn3qF7Ghuww== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4W5QHj4C4mzJg8; Fri, 21 Jun 2024 18:05:05 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 45LI552c021773; Fri, 21 Jun 2024 18:05:05 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 45LI55la021770; Fri, 21 Jun 2024 18:05:05 GMT (envelope-from git) Date: Fri, 21 Jun 2024 18:05:05 GMT Message-Id: <202406211805.45LI55la021770@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Colin Percival Subject: git: f7e381b076 - main - Add missing comma List-Id: Commit messages for all branches of the doc repository List-Archive: https://lists.freebsd.org/archives/dev-commits-doc-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-doc-all@freebsd.org Sender: owner-dev-commits-doc-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: cperciva X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: f7e381b076934413d284f4d8e545f22c22ab59c6 Auto-Submitted: auto-generated The branch main has been updated by cperciva: URL: https://cgit.FreeBSD.org/doc/commit/?id=f7e381b076934413d284f4d8e545f22c22ab59c6 commit f7e381b076934413d284f4d8e545f22c22ab59c6 Author: Colin Percival AuthorDate: 2024-06-21 18:04:13 +0000 Commit: Colin Percival CommitDate: 2024-06-21 18:04:56 +0000 Add missing comma I missed this when I added 14.1 to the website. Reported by: vvd --- website/themes/beastie/layouts/index.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/themes/beastie/layouts/index.html b/website/themes/beastie/layouts/index.html index 99dad24747..dc47651541 100755 --- a/website/themes/beastie/layouts/index.html +++ b/website/themes/beastie/layouts/index.html @@ -50,7 +50,7 @@ {{ i18n "production" }}: {{ index $.Site.Data.releases "rel132-current" }}, {{ index $.Site.Data.releases "rel133-current" }}, - {{ index $.Site.Data.releases "rel140-current" }} + {{ index $.Site.Data.releases "rel140-current" }}, {{ index $.Site.Data.releases "rel141-current" }}