From owner-svn-doc-head@FreeBSD.ORG Sun Oct 19 23:03:10 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 07BC8A9C; Sun, 19 Oct 2014 23:03:10 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E82063C6; Sun, 19 Oct 2014 23:03:09 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9JN39P6020242; Sun, 19 Oct 2014 23:03:09 GMT (envelope-from gavin@FreeBSD.org) Received: (from gavin@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9JN39UZ020241; Sun, 19 Oct 2014 23:03:09 GMT (envelope-from gavin@FreeBSD.org) Message-Id: <201410192303.s9JN39UZ020241@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gavin set sender to gavin@FreeBSD.org using -f From: Gavin Atkinson Date: Sun, 19 Oct 2014 23:03:09 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45853 - head/en_US.ISO8859-1/books/bibliography X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 19 Oct 2014 23:03:10 -0000 Author: gavin Date: Sun Oct 19 23:03:09 2014 New Revision: 45853 URL: https://svnweb.freebsd.org/changeset/doc/45853 Log: The bibliography has been changed many times since February 1999, don't hardcode the published date. Modified: head/en_US.ISO8859-1/books/bibliography/book.xml Modified: head/en_US.ISO8859-1/books/bibliography/book.xml ============================================================================== --- head/en_US.ISO8859-1/books/bibliography/book.xml Sat Oct 18 22:18:57 2014 (r45852) +++ head/en_US.ISO8859-1/books/bibliography/book.xml Sun Oct 19 23:03:09 2014 (r45853) @@ -13,7 +13,7 @@ The FreeBSD Documentation Project - February 1999 + $FreeBSD$ 2001 From owner-svn-doc-head@FreeBSD.ORG Mon Oct 20 11:50:06 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 8022E736; Mon, 20 Oct 2014 11:50:06 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 6C831919; Mon, 20 Oct 2014 11:50:06 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9KBo660008739; Mon, 20 Oct 2014 11:50:06 GMT (envelope-from erwin@FreeBSD.org) Received: (from erwin@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9KBo6jB008738; Mon, 20 Oct 2014 11:50:06 GMT (envelope-from erwin@FreeBSD.org) Message-Id: <201410201150.s9KBo6jB008738@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: erwin set sender to erwin@FreeBSD.org using -f From: Erwin Lansing Date: Mon, 20 Oct 2014 11:50:06 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45854 - head/share/pgpkeys X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 20 Oct 2014 11:50:06 -0000 Author: erwin (src,ports committer) Date: Mon Oct 20 11:50:05 2014 New Revision: 45854 URL: https://svnweb.freebsd.org/changeset/doc/45854 Log: Update with signatures from last DNS-OARC Meeting Modified: head/share/pgpkeys/erwin.key Modified: head/share/pgpkeys/erwin.key ============================================================================== --- head/share/pgpkeys/erwin.key Sun Oct 19 23:03:09 2014 (r45853) +++ head/share/pgpkeys/erwin.key Mon Oct 20 11:50:05 2014 (r45854) @@ -11,6 +11,7 @@ sub 2048R/0xD7698209D2B4D6C3 2013-09-2 ]]> From owner-svn-doc-head@FreeBSD.ORG Mon Oct 20 14:56:02 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 4B8757EA; Mon, 20 Oct 2014 14:56:02 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 1D99B684; Mon, 20 Oct 2014 14:56:02 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9KEu14u001537; Mon, 20 Oct 2014 14:56:01 GMT (envelope-from jhb@FreeBSD.org) Received: (from jhb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9KEu1M7001536; Mon, 20 Oct 2014 14:56:01 GMT (envelope-from jhb@FreeBSD.org) Message-Id: <201410201456.s9KEu1M7001536@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: jhb set sender to jhb@FreeBSD.org using -f From: John Baldwin Date: Mon, 20 Oct 2014 14:56:01 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45855 - head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 20 Oct 2014 14:56:02 -0000 Author: jhb Date: Mon Oct 20 14:56:01 2014 New Revision: 45855 URL: https://svnweb.freebsd.org/changeset/doc/45855 Log: Document 1100030 (SOCK_RAW changes), 1100033 (*access* mode arg validation), 1100038 (TCP wrapper header cleanups), and 1100039 (removal of MAP_RENAME and MAP_NORESERVE). Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Mon Oct 20 11:50:05 2014 (r45854) +++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Mon Oct 20 14:56:01 2014 (r45855) @@ -5396,6 +5396,14 @@ + 1100030 + September 1, 2014 + 11.0-CURRENT after SOCK_RAW + sockets were changed to not modify packets at all (rev + 270929). + + + 1100031 September 9, 2014 11.0-CURRENT after FreeBSD-SA-14:18.openssl @@ -5414,6 +5422,15 @@ + 1100033 + September 9, 2014 + 11.0-CURRENT after changing + access, eaccess, and + faccessat to validate the mode argument + (rev 271657). + + + 1100034 September 16, 2014 11.0-CURRENT after FreeBSD-SA-14:19.tcp @@ -5442,6 +5459,21 @@ (rev 272673). + + 1100038 + October 11, 2014 + 11.0-CURRENT after cleanup of TCP wrapper headers. + (rev 272951). + + + + 1100039 + October 18, 2014 + 11.0-CURRENT after removal of + MAP_RENAME and + MAP_NORESERVE (rev + 273250). + From owner-svn-doc-head@FreeBSD.ORG Tue Oct 21 11:15:15 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 3647F4DF; Tue, 21 Oct 2014 11:15:15 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 1F44EBE3; Tue, 21 Oct 2014 11:15:15 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9LBFELc004466; Tue, 21 Oct 2014 11:15:14 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9LBFE8m004465; Tue, 21 Oct 2014 11:15:14 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201410211115.s9LBFE8m004465@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Tue, 21 Oct 2014 11:15:14 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45856 - head/ja_JP.eucJP/share/xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2014 11:15:15 -0000 Author: ryusuke Date: Tue Oct 21 11:15:14 2014 New Revision: 45856 URL: https://svnweb.freebsd.org/changeset/doc/45856 Log: - Merge the following from the English version: r24989 -> r45697 head/ja_JP.eucJP/share/xml/trademarks.ent Modified: head/ja_JP.eucJP/share/xml/trademarks.ent Modified: head/ja_JP.eucJP/share/xml/trademarks.ent ============================================================================== --- head/ja_JP.eucJP/share/xml/trademarks.ent Mon Oct 20 14:56:01 2014 (r45855) +++ head/ja_JP.eucJP/share/xml/trademarks.ent Tue Oct 21 11:15:14 2014 (r45856) @@ -10,29 +10,31 @@ Please keep this file sorted. $FreeBSD$ - Original revision: 1.28 + Original revision: r45697 --> 3Com ¤ª¤è¤Ó HomeConnect ¤Ï 3Com Corporation ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> - + -3ware ¤ª¤è¤Ó Escalade ¤Ï - 3ware Inc. ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> +3ware ¤Ï 3ware Inc. ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> Adaptec ¤Ï Adaptec, Inc. ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> -Adobe, Acrobat, Acrobat Reader ¤ª¤è¤Ó +Adobe, Acrobat, Acrobat Reader, Flash ¤ª¤è¤Ó PostScript ¤Ï ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó/¤Þ¤¿¤Ï¤½¤Î¾¤Î¹ñ¤Î Adobe Systems Incorporated ¤ÎÅÐÏ¿¾¦É¸¤Þ¤¿¤Ï¾¦É¸¤Ç¤¹¡£"> AMD, AMD Athlon, - AMD Opteron, Élan ¤ª¤è¤Ó PCnet ¤Ï + AMD Opteron, Athlon, Élan, Opteron ¤ª¤è¤Ó PCnet ¤Ï Advanced Micro Devices, Inc. ¤Î¾¦É¸¤Ç¤¹¡£"> -Apple, FireWire, Mac, Macintosh, Mac OS, + +Apple, AirPort, FireWire, + iMac, iPhone, iPad, + Mac, Macintosh, Mac OS, Quicktime ¤ª¤è¤Ó TrueType ¤Ï Apple Computer, Inc. ¤Î¾¦É¸¤Ç¡¢ ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤ÇÅÐÏ¿¤µ¤ì¤Æ¤¤¤Þ¤¹¡£"> @@ -46,6 +48,11 @@ ¥«¥Ê¥À¡¢¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó/¤Þ¤¿¤Ï¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë Corel Corporation ¤ª¤è¤Ó/¤Þ¤¿¤Ï¤½¤Î´ØÏ¢²ñ¼Ò¤Î¾¦É¸¤Þ¤¿¤ÏÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> + +Coverity ¤ÏÅÐÏ¿¾¦É¸¤Ç¤¹; +Coverity Extend, Coverity Prevent ¤ª¤è¤Ó Coverity Prevent SQS ¤Ï¡¢ +Coverity, Inc. ¤Î¾¦É¸¤Ç¤¹¡£"> + Sound Blaster ¤Ï ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó/¤Þ¤¿¤Ï¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë @@ -58,13 +65,26 @@ FreeBSD ¤Ï The FreeBSD Foundation ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> + +Fujitsu, the Fujitsu logo, LifeBook, + Stylistic, PRIMEPOWER, PRIMEQUEST, PRIMECLUSTER, ETERNUS, TRIOLE, + ESPRIMO, BioMedCAChe, CAChe, CELLINJECTOR, isS, Materials Explorer, + SystemWalker ¤ª¤è¤Ó Interstage ¤Ï¡¢ + ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë + Fujitsu Limited ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> + + +Android + ¤Ï Google Inc. ¤Î¾¦É¸¤Ç¤¹¡£"> + Heidelberg, Helvetica, - Palatino, and Times Roman ¤Ï¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë + Palatino, ¤ª¤è¤Ó Times Roman ¤Ï¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë Heidelberger Druckmaschinen AG ¤ÎÅÐÏ¿¾¦É¸¤Þ¤¿¤Ï¾¦É¸¤Ç¤¹¡£"> -IBM, AIX, OS/2, PowerPC, PS/2, S/390 ¤ª¤è¤Ó ThinkPad ¤Ï - ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó/¤Þ¤¿¤Ï¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë +IBM, AIX, OS/2, + PowerPC, PS/2, S/390 ¤ª¤è¤Ó ThinkPad ¤Ï + ¥¢¥á¥ê¥«¹ç½°¹ñ¡¢¤½¤Î¾¤Î¹ñ¡¢¤Þ¤¿¤ÏξÊý¤Ë¤ª¤±¤ë International Business Machines Corporation ¤Î¾¦É¸¤Ç¤¹¡£"> IEEE, POSIX ¤ª¤è¤Ó 802 ¤Ï @@ -72,6 +92,7 @@ Institute of Electrical and Electronics Engineers, Inc. ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> + Intel, Celeron, EtherExpress, i386, i486, Itanium, Pentium ¤ª¤è¤Ó Xeon ¤Ï¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë Intel Corporation ¤Þ¤¿¤Ï¤½¤Î´ØÏ¢²ñ¼Ò¤Î¾¦É¸¤Þ¤¿¤ÏÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> @@ -79,7 +100,7 @@ Intuit ¤ª¤è¤Ó Quicken ¤Ï ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë Intuit Inc. ¤Þ¤¿¤Ï¤½¤Î´ØÏ¢²ñ¼Ò¤Î - ÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> + ¾¦É¸¤ª¤è¤Ó/¤Þ¤¿¤ÏÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> Iomega, Zip ¤ª¤è¤Ó Jaz ¤Ï ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó/¤Þ¤¿¤Ï¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë @@ -96,6 +117,8 @@ LSI Logic, AcceleRAID, eXtremeRAID, MegaRAID ¤ª¤è¤Ó Mylex ¤Ï LSI Logic Corp. ¤Î¾¦É¸¤Þ¤¿¤ÏÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> + Macromedia, Flash ¤ª¤è¤Ó Shockwave ¤Ï ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó/¤Þ¤¿¤Ï¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë Macromedia, Inc. ¤Î¾¦É¸¤Þ¤¿¤ÏÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> @@ -113,10 +136,15 @@ M-Systems ¤ª¤è¤Ó DiskOnChip ¤Ï M-Systems Flash Disk Pioneers, Ltd. ¤Î¾¦É¸¤Þ¤¿¤ÏÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> + +NetBSD ¤Ï the NetBSD Foundation ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> + Netscape ¤ª¤è¤Ó the Netscape Navigator ¤Ï ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë Netscape Communications Corporation ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> + GateD ¤ª¤è¤Ó NextHop ¤Ï ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë @@ -126,6 +154,10 @@ ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë The Open Group ¤ÎÅÐÏ¿¾¦É¸¤Ç¡¢ IT DialTone ¤ª¤è¤Ó The Open Group ¤ÏƱ¤¸¤¯¾¦É¸¤Ç¤¹¡£"> +UNIX ¤Ï + ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë + The Open Group ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> + Oracle ¤Ï @@ -133,7 +165,7 @@ PowerQuest ¤ª¤è¤Ó PartitionMagic ¤Ï - ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë + ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó/¤Þ¤¿¤Ï¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë PowerQuest Corporation ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> @@ -150,20 +182,27 @@ ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë Red Hat, Inc. ¤Î¾¦É¸¤Þ¤¿¤ÏÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> + SAP, R/3 ¤ª¤è¤Ó mySAP ¤Ï ¥É¥¤¥Ä¤ª¤è¤ÓÀ¤³¦Ãæ¤Î¤¤¤¯¤Ä¤â¤Î¹ñ¤Ë¤ª¤±¤ë SAP AG ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> Silicon Graphics, SGI ¤ª¤è¤Ó OpenGL ¤Ï - ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë + ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó/¤Þ¤¿¤Ï¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë Silicon Graphics, Inc. ¤ÎÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> -Sparc, Sparc64 ¤ª¤è¤Ó +SPARC, SPARC64 ¤ª¤è¤Ó UltraSPARC ¤Ï¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë - SPARC International, Inc. ¤Î¾¦É¸¤Ç¤¹¡£SPARC ¤Î¾¦É¸¤ò¤Ä¤±¤¿À½ÉÊ¤Ï - Sun Microsystems, Inc. ¤¬³«È¯¤·¤¿¥¢¡¼¥­¥Æ¥¯¥Á¥ã¤Ë´ð¤Å¤¤¤Æ¤¤¤Þ¤¹¡£"> - -Sun, Sun Microsystems, Java, Java Virtual Machine, JDK, JSP, JVM, Netra, Solaris, StarOffice, - ¤ª¤è¤Ó SunOS ¤Ï + SPARC International, Inc. ¤Î¾¦É¸¤Ç¤¹¡£ + SPARC International, Inc ¤Ï¡¢¤¹¤Ù¤Æ¤Î SPARC ¾¦É¸¤ò½êÍ­¤·¤Æ¤¤¤Þ¤¹¡£ + ¤Þ¤¿¡¢¥é¥¤¥»¥ó¥¹µöÂú·ÀÌó¤Î¤â¤È¤Ç¡¢ + ¤½¤Î¥á¥ó¥Ð¡¼¤Ï¡¢¤³¤ì¤é¤Î¾¦É¸¤òŬÀÚ¤ÊÈϰϤǻÈÍѤ¹¤ë¤³¤È¤¬¤Ç¤­¤Þ¤¹¡£"> + + +Sun, Sun Microsystems, Java, Java + Virtual Machine, JDK, JRE, JSP, JVM, Netra, OpenJDK, + Solaris, StarOffice, SunOS + ¤ª¤è¤Ó VirtualBox ¤Ï ¥¢¥á¥ê¥«¹ç½°¹ñ¤ª¤è¤Ó¤½¤Î¾¤Î¹ñ¤Ë¤ª¤±¤ë Sun Microsystems, Inc. ¤Î ¾¦É¸¤Þ¤¿¤ÏÅÐÏ¿¾¦É¸¤Ç¤¹¡£"> From owner-svn-doc-head@FreeBSD.ORG Tue Oct 21 20:48:12 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id A3502E25; Tue, 21 Oct 2014 20:48:12 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8C4156DD; Tue, 21 Oct 2014 20:48:12 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9LKmC9x084198; Tue, 21 Oct 2014 20:48:12 GMT (envelope-from delphij@FreeBSD.org) Received: (from delphij@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9LKm9VO084176; Tue, 21 Oct 2014 20:48:09 GMT (envelope-from delphij@FreeBSD.org) Message-Id: <201410212048.s9LKm9VO084176@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: delphij set sender to delphij@FreeBSD.org using -f From: Xin LI Date: Tue, 21 Oct 2014 20:48:09 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45857 - in head/share: security/advisories security/patches/SA-14:20 security/patches/SA-14:21 security/patches/SA-14:22 security/patches/SA-14:23 xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2014 20:48:12 -0000 Author: delphij Date: Tue Oct 21 20:48:08 2014 New Revision: 45857 URL: https://svnweb.freebsd.org/changeset/doc/45857 Log: Add SA-14:20 - SA-14:23. Added: head/share/security/advisories/FreeBSD-SA-14:20.rtsold.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-14:21.routed.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-14:22.namei.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-14:23.openssl.asc (contents, props changed) head/share/security/patches/SA-14:20/ head/share/security/patches/SA-14:20/rtsold.patch (contents, props changed) head/share/security/patches/SA-14:20/rtsold.patch.asc (contents, props changed) head/share/security/patches/SA-14:21/ head/share/security/patches/SA-14:21/routed.patch (contents, props changed) head/share/security/patches/SA-14:21/routed.patch.asc (contents, props changed) head/share/security/patches/SA-14:22/ head/share/security/patches/SA-14:22/namei-10.patch (contents, props changed) head/share/security/patches/SA-14:22/namei-10.patch.asc (contents, props changed) head/share/security/patches/SA-14:22/namei-9.patch (contents, props changed) head/share/security/patches/SA-14:22/namei-9.patch.asc (contents, props changed) head/share/security/patches/SA-14:23/ head/share/security/patches/SA-14:23/openssl-10.0.patch (contents, props changed) head/share/security/patches/SA-14:23/openssl-10.0.patch.asc (contents, props changed) head/share/security/patches/SA-14:23/openssl-8.4.patch (contents, props changed) head/share/security/patches/SA-14:23/openssl-8.4.patch.asc (contents, props changed) head/share/security/patches/SA-14:23/openssl-9.3.patch (contents, props changed) head/share/security/patches/SA-14:23/openssl-9.3.patch.asc (contents, props changed) Modified: head/share/xml/advisories.xml Added: head/share/security/advisories/FreeBSD-SA-14:20.rtsold.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-14:20.rtsold.asc Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,169 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + +============================================================================= +FreeBSD-SA-14:20.rtsold Security Advisory + The FreeBSD Project + +Topic: rtsold(8) remote buffer overflow vulnerability + +Category: core +Module: rtsold +Announced: 2014-10-21 +Credits: Florian Obser, Hiroki Sato +Affects: FreeBSD 9.1 and later. +Corrected: 2014-10-21 20:20:07 UTC (stable/10, 10.1-PRERELEASE) + 2014-10-21 20:20:36 UTC (releng/10.1, 10.1-RC2-p1) + 2014-10-21 20:20:36 UTC (releng/10.1, 10.1-RC1-p1) + 2014-10-21 20:20:36 UTC (releng/10.1, 10.1-BETA3-p1) + 2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10) + 2014-10-21 20:20:17 UTC (stable/9, 9.3-STABLE) + 2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3) + 2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13) + 2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20) +CVE Name: CVE-2014-3954 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +As part of the stateless addess autoconfiguration (SLAAC) mechanism, +IPv6 routers periodically broadcast router advertisement messages on +attached networks to inform hosts of the correct network prefix, +router address and MTU, as well as additional network parameters such +as the DNS servers (RDNSS), DNS search list (DNSSL) and whether a +stateful configuration service is available. Hosts that have recently +joined the network can broadcast a router solicitation message to +solicit an immediate advertisement instead of waiting for the next +periodic advertisement. + +The router solicitation daemon, rtsold(8), broadcasts router +solicitation messages at startup or when the state of an interface +changes from passive to active. Incoming router advertisement +messages are first processed by the kernel and then passed on to +rtsold(8), which handles the DNS and stateful configuration options. + +II. Problem Description + +Due to a missing length check in the code that handles DNS parameters, +a malformed router advertisement message can result in a stack buffer +overflow in rtsold(8). + +III. Impact + +Receipt of a router advertisement message with a malformed DNSSL +option, for instance from a compromised host on the same network, can +cause rtsold(8) to crash. + +While it is theoretically possible to inject code into rtsold(8) +through malformed router advertisement messages, it is normally +compiled with stack protection enabled, rendering such an attack +extremely difficult. + +When rtsold(8) crashes, the existing DNS configuration will remain in +force, and the kernel will continue to receive and process periodic +router advertisements. + +IV. Workaround + +No workaround is available, but systems that do not run rtsold(8) are +not affected. + +As a general rule, SLAAC should not be used on networks where trusted +and untrusted hosts coexist in the same broadcast domain. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch http://security.FreeBSD.org/patches/SA-14:20/rtsold.patch +# fetch http://security.FreeBSD.org/patches/SA-14:20/rtsold.patch.asc +# gpg --verify rtsold.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/rtsold.patch + +c) Recompile rtsold. Execute the following commands as root: + +# cd /usr/src/usr.sbin/rtsold +# make && make install + +4) Restart the affected service + +To restart the affected service after updating the system, either +reboot the system or execute the following command as root: + +# service rtsold restart + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/9/ r273412 +releng/9.1/ r273415 +releng/9.2/ r273415 +releng/9.3/ r273415 +stable/10/ r273411 +releng/10.0/ r273415 +releng/10.1/ r273414 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1 + +iQIcBAEBAgAGBQJURsSoAAoJEO1n7NZdz2rn5GsP/2y0fUJYVdsZjA4VtUcLFp4Q +nhjGO3I4NOXZAj3c+bWwbw/Bmg7juFVXiAdLgcpK8UuTT+0znAkEcGoG+uA9q6K1 +PoFjTmXoukIqtu4sd5Gxp74+xVqY41XOuwanHNMiCbvGEbInxoCs3t56C7Ai1/9m +DXhDCukNEH9JZv5qUS5L7IcosuQs2l1viU9oUA/hSfVeI9IFKp8SItDthwtLVrXe +bgr50oQdCtwR3gx3Dwkg//er3JCsSJ0ixJO0bGGaqnGLPq7gwmJf8zKy10EE2fri +AMpUcYMsO+MqhE+PyyuW9MJaPpX+zghZac75UYPh0EckIn8m2p6QGYXcDtZ18qR8 +uq4JCk5nDARKuy7kraEuNJgFzNIBN/wVwOSqaF4n43vhmsuiKF9uzePrtEhB7xoN +7vT66EXXkCgiqQrQVJ6IH5LzoUJtYVDZTWLWU66r919qbQzYQFU7uslaGF8rgVIg +HZOfEbDto3dvULmbVHkaWiyotKYSKXZROBTKvTOWVs+BX37zQgg4PGuU6CqatB8R +Sltg2kxycQXoIm5XiiSL18RTgxEWb+DKfw8e/691EM1/F3XIQVNX11wJpeZwL/sf +zE9TtTnmqpIBPGIe7aURgJWwX/iA4ljAqB1t5DmgIQrJMXovMXnAVMIu4L2jy+gY +eRy82+SI3pc3thChv2hv +=L56U +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-14:21.routed.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-14:21.routed.asc Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,163 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + +============================================================================= +FreeBSD-SA-14:21.routed Security Advisory + The FreeBSD Project + +Topic: routed(8) remote denial of service vulnerability + +Category: core +Module: routed +Announced: 2014-10-21 +Credits: Hiroki Sato +Affects: All supported versions of FreeBSD. +Corrected: 2014-10-21 20:20:07 UTC (stable/10, 10.1-PRERELEASE) + 2014-10-21 20:20:36 UTC (releng/10.1, 10.1-RC2-p1) + 2014-10-21 20:20:36 UTC (releng/10.1, 10.1-RC1-p1) + 2014-10-21 20:20:36 UTC (releng/10.1, 10.1-BETA3-p1) + 2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10) + 2014-10-21 20:20:17 UTC (stable/9, 9.3-STABLE) + 2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3) + 2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13) + 2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20) + 2014-10-21 20:20:26 UTC (stable/8, 8.4-STABLE) + 2014-10-21 20:21:27 UTC (releng/8.4, 8.4-RELEASE-p17) +CVE Name: CVE-2014-3955 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +The routing information protocol (RIP) is an older routing protocol +which, while not as capable as more recent protocols such as OSPF and +BGP, is sometimes preferred for its simplicity and therefore still +used as an interior gateway protocol on smaller networks. + +Routers in a RIP network periodically broadcast their routing table on +all enabled interfaces. Neighboring routers and hosts receive these +broadcasts and update their routing tables accordingly. + +The routed(8) daemon is a RIP implementation for FreeBSD. The +rtquery(8) utility can be used to send a RIP query to a router and +display the result without updating the routing table. + +II. Problem Description + +The input path in routed(8) will accept queries from any source and +attempt to answer them. However, the output path assumes that the +destination address for the response is on a directly connected +network. + +III. Impact + +Upon receipt of a query from a source which is not on a directly +connected network, routed(8) will trigger an assertion and terminate. +The affected system's routing table will no longer be updated. If the +affected system is a router, its routes will eventually expire from +other routers' routing tables, and its networks will no longer be +reachable unless they are also connected to another router. + +IV. Workaround + +Use a packet filter such as pf(4) or ipfw(4) to block incoming UDP +packets with destination port 520 that did not originate on the same +subnet as the destination address. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch http://security.FreeBSD.org/patches/SA-14:21/routed.patch +# fetch http://security.FreeBSD.org/patches/SA-14:21/routed.patch.asc +# gpg --verify routed.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/routed.patch + +c) Recompile routed. Execute the following commands as root: + +# cd /usr/src/sbin/routed +# make && make install + +4) Restart the affected service + +To restart the affected service after updating the system, either +reboot the system or execute the following command as root: + +# service routed restart + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/8/ r273413 +releng/8.4/ r273416 +stable/9/ r273412 +releng/9.1/ r273415 +releng/9.2/ r273415 +releng/9.3/ r273415 +stable/10/ r272872 +releng/10.0/ r273415 +releng/10.1/ r273414 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1 + +iQIcBAEBAgAGBQJURsSrAAoJEO1n7NZdz2rneOIQAIXaYGwNAYmVFUqa/YOtxSlQ +l1ETThsuHxuDUrlkHD82uZu6yJi+HdGz1R2xBLYlxpwk/4GO3D/IdUZI0w1LgNJs +JRHmAikUpCgcMh0QfyoHD9KSp3wPiQJ9Cmp6ajrjsdIdjrNbFwczoaWHHQ1MyRwp +kv9OEC7t9rJkZRMuCjrSvGTQVqHFixoZUdJV42a2PNYTyWZmwE33GJ+Zgv/59mPw +bzGTTI3RTuj1WUJp4MmYV3Eb8y8SnM6szUs4Wlul/uVGfEI3dXYYo3iAHQNHWpAR +sUaqoVI16P5x952I9PbMA/J5wq/Nm2bVwEAsJN9NE/KPMdD1I4QzvyAlNRFCro8S +C7qS4a0X75nQ+pehRqPVDdnvJbkxfdgsWP+jwVZ4e0244DQfiKWTKTd+If/cPHa8 +T0z1uZ4xE/BQ0DpJiu9r/ndcm5ych6TbIkNXmGI05jQPntvSYQzhyUTEp2Rmq3IX +rmre4CHWrTYT7/niTJonieErmtGDe5LrUyP2Odv13euKEsCIbSOPVnDFFhAwsAjJ +zu2Tm+BPXh0lXHuq/tQ+L5lWv1uoMi9hkLxh6zhFaX4li15sS5tR+GeBXmd9h2Wp ++iT5hvgxfnQPZI3Ey932J20+7LMULlkr2aV2h5NcvroolnQIehj12z0IQBelFsXN +wtFPveXqXWUfV8WVNBJ1 +=uHh+ +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-14:22.namei.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-14:22.namei.asc Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,153 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + +============================================================================= +FreeBSD-SA-14:22.namei Security Advisory + The FreeBSD Project + +Topic: memory leak in sandboxed namei lookup + +Category: core +Module: kernel +Announced: 2014-10-21 +Credits: Mateusz Guzik +Affects: FreeBSD 9.1 and later. +Corrected: 2014-10-21 20:20:07 UTC (stable/10, 10.1-PRERELEASE) + 2014-10-21 20:20:36 UTC (releng/10.1, 10.1-RC2-p1) + 2014-10-21 20:20:36 UTC (releng/10.1, 10.1-RC1-p1) + 2014-10-21 20:20:36 UTC (releng/10.1, 10.1-BETA3-p1) + 2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10) + 2014-10-21 20:20:17 UTC (stable/9, 9.3-STABLE) + 2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3) + 2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13) + 2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20) +CVE Name: CVE-2014-3711 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +The namei kernel facility is responsible for performing and caching +translations from path names to file system objects (vnodes). + +Capsicum is a lightweight capability and sandbox framework using a +hybrid capability system model. It is often used to create sandboxes +for applications that process data from untrusted sources. + +II. Problem Description + +The namei facility will leak a small amount of kernel memory every +time a sandboxed process looks up a nonexistent path name. + +III. Impact + +A remote attacker that can cause a sandboxed process (for instance, a +web server) to look up a large number of nonexistent path names can +cause memory exhaustion. + +IV. Workaround + +Systems that do not have Capsicum enabled or do not run services that +use Capsicum are not vulnerable. + +On systems that have Capsicum compiled into the kernel, it can be +disabled by executing the following command as root: + +# sysctl kern.features.security_capabilities=0 + +Services that use Capsicum are usually able to run without it, albeit +with reduced security. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 9.x] +# fetch http://security.FreeBSD.org/patches/SA-14:22/namei-9.patch +# fetch http://security.FreeBSD.org/patches/SA-14:22/namei-9.patch.asc +# gpg --verify namei-9.patch.asc + +[FreeBSD 10.x] +# fetch http://security.FreeBSD.org/patches/SA-14:22/namei-10.patch +# fetch http://security.FreeBSD.org/patches/SA-14:22/namei-10.patch.asc +# gpg --verify namei-10.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/9/ r273412 +releng/9.1/ r273415 +releng/9.2/ r273415 +releng/9.3/ r273415 +stable/10/ r273411 +releng/10.0/ r273415 +releng/10.1/ r273414 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1 + +iQIcBAEBAgAGBQJURsStAAoJEO1n7NZdz2rnoMoQAIuqKpDLi+sGXnWUQeYGPEZH +OqwkK9ZbvEiNDAeol03FvxfTg8LzI4OtzkceFDy7KWUTNUN3HnGq1MhFLo+s5r7x +KtJVIzKgitZVh/1ikr6+DObpuwVHQfdKws6NKqCssqOknDIcNhNG97B1wl/QwnDX +3/BmAWFYaf6+AG0+vQhxUBTuP9keu8DlpBJ4eEbhRqVCSuo6enJ4uTQXOet7lEOR +loGqhuMJB265qi2e/vkcnXnOrd6eGQ9vkVJTS0jKmKF3VG8HTcUmUvwLAGeqmTuV +LIJVpSaFgDX7BuG0tUhwmtmql4+ROU6tyHVWBAmVcSNTRgy9L/It/BdG0slNdVVq +2OG0ApKCQIukfK6xtz7adgxRYvClzVZZmyjEPzu0MGs/imdEpfgsUap9yrPhHyoe +KM98VaKtzz2e09KxoAxAezgioDCv5rLZnaX8IqBlFft3BvfPP7TPbKrPvvmETu4P +/4nthuEFE4jl9xyVINaHdKW9gVAOP44OAj+HlxvNxn4llkrA2v4Zbc3mjukK0ZEx +OKz++lf7SmfTPI1lD+oN6FJRWEkK0YnVytsw8taHYlqDYdxaL+OB60B+Ko2JoqpL +AROBT2tp9j/NsG46CgDFqA7oV5JWe/Kk67VrkOs8BL6nplKVD9M5m4XDyakn9wkk +PA3J/dN5bSd7VIxYExZD +=MO7y +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-14:23.openssl.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-14:23.openssl.asc Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,193 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + +============================================================================= +FreeBSD-SA-14:23.openssl Security Advisory + The FreeBSD Project + +Topic: OpenSSL multiple vulnerabilities + +Category: contrib +Module: openssl +Announced: 2014-10-21 +Affects: All supported versions of FreeBSD. +Corrected: 2014-10-15 19:59:43 UTC (stable/10, 10.1-PRERELEASE) + 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC3) + 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC2-p1) + 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC1-p1) + 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-BETA3-p1) + 2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10) + 2014-10-15 20:28:31 UTC (stable/9, 9.3-STABLE) + 2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3) + 2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13) + 2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20) + 2014-10-15 20:28:31 UTC (stable/8, 8.4-STABLE) + 2014-10-21 20:21:27 UTC (releng/8.4, 8.4-RELEASE-p17) +CVE Name: CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is +a collaborative effort to develop a robust, commercial-grade, full-featured +Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) +and Transport Layer Security (TLS v1) protocols as well as a full-strength +general purpose cryptography library. + +II. Problem Description + +A flaw in the DTLS SRTP extension parsing code allows an attacker, who +sends a carefully crafted handshake message, to cause OpenSSL to fail +to free up to 64k of memory causing a memory leak. [CVE-2014-3513]. + +When an OpenSSL SSL/TLS/DTLS server receives a session ticket the +integrity of that ticket is first verified. In the event of a session +ticket integrity check failing, OpenSSL will fail to free memory +causing a memory leak. [CVE-2014-3567]. + +The SSL protocol 3.0, as supported in OpenSSL and other products, supports +CBC mode encryption where it could not adequately check the integrity of +padding, because of the use of non-deterministic CBC padding. This +protocol weakness makes it possible for an attacker to obtain clear text +data through a padding-oracle attack. + +Some client applications (such as browsers) will reconnect using a +downgraded protocol to work around interoperability bugs in older +servers. This could be exploited by an active man-in-the-middle to +downgrade connections to SSL 3.0 even if both sides of the connection +support higher protocols. SSL 3.0 contains a number of weaknesses +including POODLE [CVE-2014-3566]. + +OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications +to block the ability for a MITM attacker to force a protocol downgrade. + +When OpenSSL is configured with "no-ssl3" as a build option, servers +could accept and complete a SSL 3.0 handshake, and clients could be +configured to send them. [CVE-2014-3568]. + +III. Impact + +A remote attacker can cause Denial of Service with OpenSSL 1.0.1 +server implementations for both SSL/TLS and DTLS regardless of +whether SRTP is used or configured. [CVE-2014-3513] + +By sending a large number of invalid session tickets an attacker +could exploit this issue in a Denial Of Service attack. +[CVE-2014-3567]. + +An active man-in-the-middle attacker can force a protocol downgrade +to SSLv3 and exploit the weakness of SSLv3 to obtain clear text data +from the connection. [CVE-2014-3566] [CVE-2014-3568] + +IV. Workaround + +No workaround is available. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 10.0] +# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch +# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch.asc +# gpg --verify openssl-10.0.patch.asc + +[FreeBSD 9.3] +# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch +# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch.asc +# gpg --verify openssl-9.3.patch.asc + +[FreeBSD 8.4, 9.1 and 9.2] +# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch +# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch.asc +# gpg --verify openssl-8.4.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart all deamons using the library, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/8/ r273151 +releng/8.4/ r273416 +stable/9/ r273151 +releng/9.1/ r273415 +releng/9.2/ r273415 +releng/9.3/ r273415 +stable/10/ r273149 +releng/10.0/ r273415 +releng/10.1/ r273399 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + + + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1 + +iQIcBAEBAgAGBQJURsSwAAoJEO1n7NZdz2rn3ekQANG9DnAGJq/yAXXtX4wdeP08 +Ep35L3dkxJsthoqJhn7fc/pra5SZ5iS7NCRHdh5Xn1dsxRiOsffYt9zanWyTOgj+ +RQy9jiNp0oIWQEkxZVoHMIKn6VeQk1I2llSXyERANjeDtKX6GV2gV+Zd4tcExW4T +Nn9jVHgkDL/doxJ3C1K0BrkdoEEwyPohAf8WLAg6ZKRm3Pys1Ewjm6fPBPtKUIEu +zWFruP5xFz3rM6i/4zcihj7b4BuIKtUBgHf28rgf0I3TKZTr75Xr9h4q/8ZG4H0G +Lk/1OoZTiMyjlBLufpTlCOdODjz7ORzDLif47Zyt52iZowq1hl4WO7Xo/C/kPUmG +o631wsLmO9tPS2Z0TmIQm1fwjlTvIZefZAlMpa1lDwnwZx2hRsu9TzauACdSbuWx +9i+e8/CSMEsr0qJo8KXjltpV9siULhkvl9xr3PwxMfvHFjGUAuur2zHUoTQZTpy0 +nKJJXSs3kIW/4ivLMDuDYijdVnf4hrih6GTKEND6aNXtyXitiFK8J4a/q0T4BBnh +89A2QUFVeeDPmf7jzMh824s8W2uoPFGJqHgdtqv1bLT29rqh5ya/5zi7sci6Q/Mk +ov0U8X3Pwun7iwJDeYG6N38lUSdMqImHR12Ay7pOY04i4qau4Yf8B26lwcMk/HrU +cZ84y1sCp0qHtTqKuak9 +=ywze +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-14:20/rtsold.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-14:20/rtsold.patch Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,14 @@ +Index: usr.sbin/rtsold/rtsol.c +=================================================================== +--- usr.sbin/rtsold/rtsol.c.orig ++++ usr.sbin/rtsold/rtsol.c +@@ -933,7 +933,8 @@ + dst_origin = dst; + memset(dst, '\0', dlen); + while (src && (len = (uint8_t)(*src++) & 0x3f) && +- (src + len) <= src_last) { ++ (src + len) <= src_last && ++ (dst - dst_origin < (ssize_t)dlen)) { + if (dst != dst_origin) + *dst++ = '.'; + warnmsg(LOG_DEBUG, __func__, "labellen = %zd", len); Added: head/share/security/patches/SA-14:20/rtsold.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-14:20/rtsold.patch.asc Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1 + +iQIcBAABAgAGBQJURsQSAAoJEO1n7NZdz2rnmGoQAJz5xZjKbFt1RrArI+K7pF2E +qJ9V1trv6ltofAYF74m9BIrYJBodB7s+lwd+qIIfawd5wAK7eKvYtow8izloszP7 ++f2Yl3AfXwqsJbStYfi+2OGqqYS/ruGOHRnCicILdHi2I2kH4L1/tUMiQbSe+oIj +Ro6sT236c2A1khmqChtTotaoNmFT4yyF1/wRqo0sFYu/LPav+hH3VysPTzejAIun +oLdXPe5ENKyqiMT8ikzB2NR2y4tk6a01iDBqeGjiyxo920uQBq176mAACFKzOAty +IXwWAOnomCSQBETNgl7pYcgR6hzpVEFAO/PtJjVBh/z2U1FyVfeYslGt8B6S7pUh +gBj68821d2jq56P4dKPsKQKJ8MORAZ+UcwnFqjFXF+op4ArM+9nA+MfuDUSdmBTx +j1DqhxRbH8E0v36hv+/a+LT5JZtqt0iGfAdmujjdo4kehjo5woYHd32scX5ezXrt +oq1GCckL7HACWd0cILo8CKoPTxzjr2VR3qfXqyekSDQgXXh9r+y11mmP6LwpVHa0 +LjrbNtkNUoixYPozk0JMjaZ16Ie9/r4a+cUiacrJSTpSQyLucP8CJNoj5oUEac5L +l9GwgWGr8ipjeOdd0e81UmWbEZT5pdMokpW5Z31ZjIIpvnJRah8p77KE1IVnK56L +0lgyNXhm+wD9SaO7DM52 +=l7Mg +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-14:21/routed.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-14:21/routed.patch Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,15 @@ +Index: sbin/routed/input.c +=================================================================== +--- sbin/routed/input.c.orig ++++ sbin/routed/input.c +@@ -288,6 +288,10 @@ + /* Answer a query from a utility program + * with all we know. + */ ++ if (aifp == NULL) { ++ trace_pkt("ignore remote query"); ++ return; ++ } + if (from->sin_port != htons(RIP_PORT)) { + supply(from, aifp, OUT_QUERY, 0, + rip->rip_vers, ap != 0); Added: head/share/security/patches/SA-14:21/routed.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-14:21/routed.patch.asc Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1 + +iQIcBAABAgAGBQJURsQVAAoJEO1n7NZdz2rnWtYP/2w38OHA+dJXuXZIV0Pf1dly +6u3hpDY17pFmLfeqGB56PXZ/LhXfbFTcu9b5oNyyQpSM280gipdpsryIZ+BU1zqY +dqf+NfTLIBHUgY+wJjxpPmh5c3ofdhSBJcoC3NMNruz/f5goZ/0yJ2suI0lff6G5 +NkKs2IiFY/pfRaAxOMA63sGSVUcEzSH3GK4VeP8YpCXu0rIYjLpZJKBls/vdROMV +1YujzgdLPX7bDwClAvt0M0phfkuzt/sE/PNtMhSbFwumhkxFx8HH3pJwBABTR49h +afYvBogdV+lT4+mQV4dl+vXBgl5vT3oydOfzjlfSSXIhBQxmhnWb/vxF9vt5U6xK +5M8mhpuaYNqxq/+O3X/P/OI1eKE6f6k1ohuldHY+q2HTiCAFtaIViT1sKl4BenVQ +nDPhHx9kSNHKqc5HWwiW6jL4hlWhVXMPLTZ0EB2yoUBfbsIXiZL4/vXydjayNzOK +Q5+ke9C1khOTZ9Rw2f/BVB6s37KC5UwzinKBFuRtOnkDuKrkY9unke0fyuJ+qWK6 +Vnz1bOy0y1l8fkB7sPM06IEodQUbK6E3338aYAsbWYxAm8+Vol4F+KY7hPEqHFZf +Cp8WcPQLOuYKCT3ZR1M045c4YwsnQjK648LzwrRVSVMGXzMeCJARreFT2ic8eY5X +YTokboyN50+mxMLU7EW5 +=iu3B +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-14:22/namei-10.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-14:22/namei-10.patch Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,94 @@ +Index: sys/kern/vfs_lookup.c +=================================================================== +--- sys/kern/vfs_lookup.c (revision 273277) ++++ sys/kern/vfs_lookup.c (working copy) +@@ -121,6 +121,16 @@ + * if symbolic link, massage name in buffer and continue + * } + */ ++static void ++namei_cleanup_cnp(struct componentname *cnp) ++{ ++ uma_zfree(namei_zone, cnp->cn_pnbuf); ++#ifdef DIAGNOSTIC ++ cnp->cn_pnbuf = NULL; ++ cnp->cn_nameptr = NULL; ++#endif ++} ++ + int + namei(struct nameidata *ndp) + { +@@ -185,11 +195,7 @@ + } + #endif + if (error) { +- uma_zfree(namei_zone, cnp->cn_pnbuf); +-#ifdef DIAGNOSTIC +- cnp->cn_pnbuf = NULL; +- cnp->cn_nameptr = NULL; +-#endif ++ namei_cleanup_cnp(cnp); + ndp->ni_vp = NULL; + return (error); + } +@@ -256,11 +262,7 @@ + } + } + if (error) { +- uma_zfree(namei_zone, cnp->cn_pnbuf); +-#ifdef DIAGNOSTIC +- cnp->cn_pnbuf = NULL; +- cnp->cn_nameptr = NULL; +-#endif ++ namei_cleanup_cnp(cnp); + return (error); + } + } +@@ -286,6 +288,7 @@ + if (KTRPOINT(curthread, KTR_CAPFAIL)) + ktrcapfail(CAPFAIL_LOOKUP, NULL, NULL); + #endif ++ namei_cleanup_cnp(cnp); + return (ENOTCAPABLE); + } + while (*(cnp->cn_nameptr) == '/') { +@@ -298,11 +301,7 @@ + ndp->ni_startdir = dp; + error = lookup(ndp); + if (error) { +- uma_zfree(namei_zone, cnp->cn_pnbuf); +-#ifdef DIAGNOSTIC +- cnp->cn_pnbuf = NULL; +- cnp->cn_nameptr = NULL; +-#endif ++ namei_cleanup_cnp(cnp); + SDT_PROBE(vfs, namei, lookup, return, error, NULL, 0, + 0, 0); + return (error); +@@ -312,11 +311,7 @@ + */ + if ((cnp->cn_flags & ISSYMLINK) == 0) { + if ((cnp->cn_flags & (SAVENAME | SAVESTART)) == 0) { +- uma_zfree(namei_zone, cnp->cn_pnbuf); +-#ifdef DIAGNOSTIC +- cnp->cn_pnbuf = NULL; +- cnp->cn_nameptr = NULL; +-#endif ++ namei_cleanup_cnp(cnp); + } else + cnp->cn_flags |= HASBUF; + +@@ -378,11 +373,7 @@ + vput(ndp->ni_vp); + dp = ndp->ni_dvp; + } +- uma_zfree(namei_zone, cnp->cn_pnbuf); +-#ifdef DIAGNOSTIC +- cnp->cn_pnbuf = NULL; +- cnp->cn_nameptr = NULL; +-#endif ++ namei_cleanup_cnp(cnp); + vput(ndp->ni_vp); + ndp->ni_vp = NULL; + vrele(ndp->ni_dvp); Added: head/share/security/patches/SA-14:22/namei-10.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-14:22/namei-10.patch.asc Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1 + +iQIcBAABAgAGBQJURsQYAAoJEO1n7NZdz2rndqIP/2KOMzeRy8OgxKuM634A88au +yoK6vBzkShyGaW/HrOQxdz6+5WElnrIgoeb+MZ2jA8IFo97SYwOS19ygBJrknDvn +u1XSwmZ3szDj/S70oOqbmKFFabP8fjIEhaHFa/OHakvv6KfcQdRIR7paLZc4ofGQ +Vq/Zoo+v2OO88Ais6Zkty70l4ZGcnBWpglp8j9qn+0J5tJwdt3raI52KHS+LKIWs +tP8MRxGf0GPQhuD2BI1Oh+XdETCxgF4yHav68eOAaJkjOi+ZHrhyXbnPMxTkkX1R +G6rOOYVdsJR+YpllWJowSgOB3M/HnkOKovalM2r0CtEn77rjsPK6cUBBqfdlSJAk +L42S85p7guE+oEZ0CwpdX8inKPwX5YjbRVpikQoNIPKjWak/+m2adq7sii455fJ0 +yNYNb24CnOS4wiBeqbUOkAYiLplxDhmR6TbqeklaD76rEopuf8bdO04OmUPFVWkG +4uin6TIXHvtCknOEZWGnTaA00nDJoHqnlU5F5AGB1x1wJIal7zwarRfw/U3sI5uV +hZoF5iiPH7OOYy5T9p78aYvbAyyl0W4CzLlMp1HM/c/KWoxAMXTquejfDggqsUvR +abNT5XjSjw5+MA66ArZsv16SQUIedW5J8iqOsW/Fy8OXRLKJupfMHdoB8ofJ+1zF +EPc5P5t949W1/E6GZDAk +=aaVY +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-14:22/namei-9.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-14:22/namei-9.patch Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,98 @@ +Index: sys/kern/vfs_lookup.c +=================================================================== +--- sys/kern/vfs_lookup.c.orig ++++ sys/kern/vfs_lookup.c +@@ -121,6 +121,16 @@ + * if symbolic link, massage name in buffer and continue + * } + */ ++static void ++namei_cleanup_cnp(struct componentname *cnp) ++{ ++ uma_zfree(namei_zone, cnp->cn_pnbuf); ++#ifdef DIAGNOSTIC ++ cnp->cn_pnbuf = NULL; ++ cnp->cn_nameptr = NULL; ++#endif ++} ++ + int + namei(struct nameidata *ndp) + { +@@ -182,11 +192,7 @@ + } + #endif + if (error) { +- uma_zfree(namei_zone, cnp->cn_pnbuf); +-#ifdef DIAGNOSTIC +- cnp->cn_pnbuf = NULL; +- cnp->cn_nameptr = NULL; +-#endif ++ namei_cleanup_cnp(cnp); + ndp->ni_vp = NULL; + return (error); + } +@@ -248,11 +254,7 @@ + } + } + if (error) { +- uma_zfree(namei_zone, cnp->cn_pnbuf); +-#ifdef DIAGNOSTIC +- cnp->cn_pnbuf = NULL; +- cnp->cn_nameptr = NULL; +-#endif ++ namei_cleanup_cnp(cnp); + return (error); + } + } +@@ -278,8 +280,10 @@ + if (*(cnp->cn_nameptr) == '/') { + vrele(dp); + VFS_UNLOCK_GIANT(vfslocked); +- if (ndp->ni_strictrelative != 0) ++ if (ndp->ni_strictrelative != 0) { ++ namei_cleanup_cnp(cnp); + return (ENOTCAPABLE); ++ } + while (*(cnp->cn_nameptr) == '/') { + cnp->cn_nameptr++; + ndp->ni_pathlen--; +@@ -293,11 +297,7 @@ + ndp->ni_startdir = dp; + error = lookup(ndp); + if (error) { +- uma_zfree(namei_zone, cnp->cn_pnbuf); +-#ifdef DIAGNOSTIC +- cnp->cn_pnbuf = NULL; +- cnp->cn_nameptr = NULL; +-#endif ++ namei_cleanup_cnp(cnp); + SDT_PROBE(vfs, namei, lookup, return, error, NULL, 0, + 0, 0); + return (error); +@@ -309,11 +309,7 @@ + */ + if ((cnp->cn_flags & ISSYMLINK) == 0) { + if ((cnp->cn_flags & (SAVENAME | SAVESTART)) == 0) { +- uma_zfree(namei_zone, cnp->cn_pnbuf); +-#ifdef DIAGNOSTIC +- cnp->cn_pnbuf = NULL; +- cnp->cn_nameptr = NULL; +-#endif ++ namei_cleanup_cnp(cnp); + } else + cnp->cn_flags |= HASBUF; + +@@ -379,11 +375,7 @@ + vput(ndp->ni_vp); + dp = ndp->ni_dvp; + } +- uma_zfree(namei_zone, cnp->cn_pnbuf); +-#ifdef DIAGNOSTIC +- cnp->cn_pnbuf = NULL; +- cnp->cn_nameptr = NULL; +-#endif ++ namei_cleanup_cnp(cnp); + vput(ndp->ni_vp); + ndp->ni_vp = NULL; + vrele(ndp->ni_dvp); Added: head/share/security/patches/SA-14:22/namei-9.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-14:22/namei-9.patch.asc Tue Oct 21 20:48:08 2014 (r45857) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1 + +iQIcBAABAgAGBQJURsQbAAoJEO1n7NZdz2rn7+YQAKhyf2yhQ+9oppNCmzuaFuFC +XzswwLhQwCUj8J7mkKtDHlhQuAO4Cmr/MEN37CFpvx5u9w4dnhCIuvKPICRju0bN ++KJoM/R/Szapx2x4Ntc0ld+qDH1CuECF3Vpm4A4d5x6I8rTggYAiIx70UTHMyzPs +xj9m9CKB2xpt6jZvz85a3eq/PW1A9qCumGX6da6Bo2NAO0sImpjlEiRzqmrmKKYZ +5wk1L1K71dPMo6TaRw234gMRYhhSn5GG7akRRWiB37UuJNC+Y8KwqinbG4eAXSiY +KFPkSqWPvdjLzpfGBaQTYpJvzm0Dzbwf7pjfOOLVOWfjqfMF/zn9huDMFIwtNFg6 +mPg7pBK3eXz4X6p+roeImdiFKV/RVZ6IzwS5ND6uMgTk3WdrwITjfjxxXEwR423X +/olyNl+8WP3AkLn/7lE0h9l+ZDwX2cwHIEeiD3ZDUb9OAPDKO9Ip+rdN2Wgxr2PT +wTltlTKnGB1FICFY5Vw5nL8QbiRmyZ3AxxM+DJveaFPBDRYyNXLQCUpDrPXE/OOm +7ic6FWErhNJcRWR+ONzoasZgeDeggfez6IS0MzSXPTPRoERrYNwGAWcKznXzfNiw +kJPQQaKEz1FOjVD3DoPwiO6Tno/810/h+T6exy1aEr8XMe0xyangdC8fPwLP5ndh *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** From owner-svn-doc-head@FreeBSD.ORG Tue Oct 21 21:39:12 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 226D44B7; Tue, 21 Oct 2014 21:39:12 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E82F0154; Tue, 21 Oct 2014 21:39:11 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9LLdBYF009163; Tue, 21 Oct 2014 21:39:11 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9LLdB4m009162; Tue, 21 Oct 2014 21:39:11 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201410212139.s9LLdB4m009162@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Tue, 21 Oct 2014 21:39:11 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45858 - head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2014 21:39:12 -0000 Author: gjb Date: Tue Oct 21 21:39:11 2014 New Revision: 45858 URL: https://svnweb.freebsd.org/changeset/doc/45858 Log: Document __FreeBSD_version values: 1100040, 1001501, 903505, 804506 Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Tue Oct 21 20:48:08 2014 (r45857) +++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Tue Oct 21 21:39:11 2014 (r45858) @@ -3872,6 +3872,13 @@ + 804506 + October 21, 2014 + 8.4-STABLE after FreeBSD-SA-14:21 + (rev 273413). + + + 900000 August 22, 2009 9.0-CURRENT. @@ -4464,6 +4471,14 @@ + 903505 + October 21, 2014 + 9-STABLE after FreeBSD-SA-14:20, FreeBSD-SA-14:21, + FreeBSD-SA-14:22 (rev + 273412). + + + 1000000 September 26, 2011 10.0-CURRENT. @@ -5160,6 +5175,14 @@ + 1001501 + October 21, 2014 + 10-STABLE after FreeBSD-SA-14:20, FreeBSD-SA-14:22, + FreeBSD-SA-14:23 (rev + 273411). + + + 1100000 October 10, 2013 11.0-CURRENT @@ -5474,6 +5497,13 @@ MAP_NORESERVE (rev 273250). + + + 1100040 + October 21, 2014 + 11.0-CURRENT after FreeBSD-SA-14:23 (rev + 273146). + From owner-svn-doc-head@FreeBSD.ORG Tue Oct 21 21:47:27 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 7044CBE9; Tue, 21 Oct 2014 21:47:27 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 577D4267; Tue, 21 Oct 2014 21:47:27 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9LLlREV013819; Tue, 21 Oct 2014 21:47:27 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9LLlRhq013818; Tue, 21 Oct 2014 21:47:27 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201410212147.s9LLlRhq013818@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Tue, 21 Oct 2014 21:47:27 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45859 - head/en_US.ISO8859-1/htdocs/releases/10.1R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2014 21:47:27 -0000 Author: gjb Date: Tue Oct 21 21:47:26 2014 New Revision: 45859 URL: https://svnweb.freebsd.org/changeset/doc/45859 Log: Regenerate after r273433. Approved by: re (implicit) Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/relnotes.html Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/relnotes.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.1R/relnotes.html Tue Oct 21 21:39:11 2014 (r45858) +++ head/en_US.ISO8859-1/htdocs/releases/10.1R/relnotes.html Tue Oct 21 21:47:26 2014 (r45859) @@ -1,5 +1,5 @@ -FreeBSD 10.1-RELEASE Release Notes

FreeBSD 10.1-RELEASE Release Notes

The FreeBSD Project

FreeBSD 10.1-RELEASE Release Notes

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

IBM, AIX, OS/2, PowerPC, PS/2, S/390, and ThinkPad are @@ -18,7 +18,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

Last modified on 2014-10-17 by gjb.
Abstract

The release notes for FreeBSD 10.1-RELEASE contain + ® symbol.

Last modified on 2014-10-21 by gjb.
Abstract

The release notes for FreeBSD 10.1-RELEASE contain a summary of the changes made to the FreeBSD base system on the 10.1-STABLE development line. This document lists applicable security advisories that were issued since the last @@ -65,7 +65,10 @@ parser

SA-14:14.openssl5 June 2014

Multiple vulnerabilities

SA-14:15.iconv24 June 2014

NULL pointer dereference and out-of-bounds array access

SA-14:16.file24 June 2014

Multiple vulnerabilities

SA-14:17.kmem8 July 2014

Kernel memory disclosure in control messages and SCTP notifications

SA-14:18.openssl9 September 2014

Multiple vulnerabilities

SA-14:19.tcp16 September 2014

Denial of Service in TCP packet - processing.

2.2. Kernel Changes

A new sysctl(8), + processing.

SA-14:20.rtsold21 October 2014

Remote buffer overflow + vulnerability.

SA-14:21.routed21 October 2014

Remote denial of service + vulnerability.

SA-14:22.namei21 October 2014

Memory leak in sandboxed namei + lookup.

SA-14:23.openssl21 October 2014

Multiple vulerabilities.

2.2. Kernel Changes

A new sysctl(8), kern.panic_reboot_wait_time, has been added, which allows controlling how long the system will wait after panic(9) before rebooting. [r260431]

The vt(4) driver has been merged From owner-svn-doc-head@FreeBSD.ORG Tue Oct 21 23:16:35 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 70AF3490; Tue, 21 Oct 2014 23:16:35 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5C4E8D61; Tue, 21 Oct 2014 23:16:35 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9LNGZvB056609; Tue, 21 Oct 2014 23:16:35 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9LNGZtJ056608; Tue, 21 Oct 2014 23:16:35 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201410212316.s9LNGZtJ056608@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Tue, 21 Oct 2014 23:16:35 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45860 - head/en_US.ISO8859-1/htdocs/releases/10.1R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2014 23:16:35 -0000 Author: gjb Date: Tue Oct 21 23:16:34 2014 New Revision: 45860 URL: https://svnweb.freebsd.org/changeset/doc/45860 Log: Update the 10.1-RELEASE schedule page to reflect the -RC3 builds have started, four days later than planned. Approved by: re (implicit) Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/schedule.xml Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/schedule.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.1R/schedule.xml Tue Oct 21 21:47:26 2014 (r45859) +++ head/en_US.ISO8859-1/htdocs/releases/10.1R/schedule.xml Tue Oct 21 23:16:34 2014 (r45860) @@ -126,7 +126,7 @@ RC3 builds begin 17 October 2014 - - + 21 October 2014 Third release candidate. From owner-svn-doc-head@FreeBSD.ORG Wed Oct 22 09:54:54 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 640A9875; Wed, 22 Oct 2014 09:54:54 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5060E6D5; Wed, 22 Oct 2014 09:54:54 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9M9sshs057613; Wed, 22 Oct 2014 09:54:54 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9M9ssJW057612; Wed, 22 Oct 2014 09:54:54 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201410220954.s9M9ssJW057612@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Wed, 22 Oct 2014 09:54:54 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45861 - head/ja_JP.eucJP/books/handbook X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 22 Oct 2014 09:54:54 -0000 Author: ryusuke Date: Wed Oct 22 09:54:53 2014 New Revision: 45861 URL: https://svnweb.freebsd.org/changeset/doc/45861 Log: - Merge the following from the English version: r45468 -> r45698 head/ja_JP.eucJP/books/handbook/book.xml Modified: head/ja_JP.eucJP/books/handbook/book.xml Modified: head/ja_JP.eucJP/books/handbook/book.xml ============================================================================== --- head/ja_JP.eucJP/books/handbook/book.xml Tue Oct 21 23:16:34 2014 (r45860) +++ head/ja_JP.eucJP/books/handbook/book.xml Wed Oct 22 09:54:53 2014 (r45861) @@ -5,7 +5,7 @@ The FreeBSD Documentation Project The FreeBSD Japanese Documentation Project - Original revision: r45468 + Original revision: r45698 $FreeBSD$ --> @@ -65,6 +65,7 @@ &tm-attrib.adobe; &tm-attrib.apple; &tm-attrib.creative; + &tm-attrib.google; &tm-attrib.heidelberger; &tm-attrib.ibm; &tm-attrib.ieee; @@ -248,6 +249,8 @@ --> &chap.disks; From owner-svn-doc-head@FreeBSD.ORG Wed Oct 22 20:16:11 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 816CAC9A; Wed, 22 Oct 2014 20:16:11 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 6A25ACC5; Wed, 22 Oct 2014 20:16:11 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9MKGBcT048871; Wed, 22 Oct 2014 20:16:11 GMT (envelope-from delphij@FreeBSD.org) Received: (from delphij@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9MKGAnq048865; Wed, 22 Oct 2014 20:16:10 GMT (envelope-from delphij@FreeBSD.org) Message-Id: <201410222016.s9MKGAnq048865@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: delphij set sender to delphij@FreeBSD.org using -f From: Xin LI Date: Wed, 22 Oct 2014 20:16:10 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45862 - in head/share: security/advisories security/patches/EN-14:10 security/patches/EN-14:11 xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 22 Oct 2014 20:16:11 -0000 Author: delphij Date: Wed Oct 22 20:16:10 2014 New Revision: 45862 URL: https://svnweb.freebsd.org/changeset/doc/45862 Log: Add EN-14:10 and EN-14:11. Added: head/share/security/advisories/FreeBSD-EN-14:10.tzdata.asc (contents, props changed) head/share/security/advisories/FreeBSD-EN-14:11.crypt.asc (contents, props changed) head/share/security/patches/EN-14:10/ head/share/security/patches/EN-14:10/tzdata-10.0.patch (contents, props changed) head/share/security/patches/EN-14:10/tzdata-10.0.patch.asc (contents, props changed) head/share/security/patches/EN-14:10/tzdata-8.4.patch (contents, props changed) head/share/security/patches/EN-14:10/tzdata-8.4.patch.asc (contents, props changed) head/share/security/patches/EN-14:10/tzdata-9.1.patch (contents, props changed) head/share/security/patches/EN-14:10/tzdata-9.1.patch.asc (contents, props changed) head/share/security/patches/EN-14:10/tzdata-9.2.patch (contents, props changed) head/share/security/patches/EN-14:10/tzdata-9.2.patch.asc (contents, props changed) head/share/security/patches/EN-14:10/tzdata-9.3.patch (contents, props changed) head/share/security/patches/EN-14:10/tzdata-9.3.patch.asc (contents, props changed) head/share/security/patches/EN-14:11/ head/share/security/patches/EN-14:11/crypt.patch (contents, props changed) head/share/security/patches/EN-14:11/crypt.patch.asc (contents, props changed) Modified: head/share/xml/notices.xml Added: head/share/security/advisories/FreeBSD-EN-14:10.tzdata.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-14:10.tzdata.asc Wed Oct 22 20:16:10 2014 (r45862) @@ -0,0 +1,175 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-14:10.tzdata Errata Notice + The FreeBSD Project + +Topic: Time zone data file update + +Category: contrib +Module: zoneinfo +Announced: 2014-10-22 +Affects: All supported versions of FreeBSD prior to FreeBSD 10.1-BETA1 +Corrected: 2014-08-29 13:41:21 UTC (stable/10, 10.1-PRERELEASE) + 2014-10-21 23:52:25 UTC (releng/10.0, 10.0-RELEASE-p11) + 2014-08-29 13:27:49 UTC (stable/9, 9.3-STABLE) + 2014-10-21 23:50:46 UTC (releng/9.3, 9.3-RELEASE-p4) + 2014-10-21 23:52:25 UTC (releng/9.2, 9.2-RELEASE-p14) + 2014-10-21 23:52:25 UTC (releng/9.1, 9.1-RELEASE-p21) + 2014-08-29 13:26:11 UTC (stable/8, 8.4-STABLE) + 2014-10-21 23:52:25 UTC (releng/8.4, 8.4-RELEASE-p18) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +The tzsetup(8) program allows the user to specify the default local +timezone. Based on the selected timezone, tzsetup(8) copies one of the +files from /usr/share/zoneinfo to /etc/localtime. This file actually +controls the conversion. + +II. Problem Description + +Several changes in Daylight Savings Time happened after previous +FreeBSD releases were released that would affect many people who +live in different countries. Because of these changes, the data in +the zoneinfo files need to be updated, and if the local timezone on +the running system is affected, tzsetup(8) needs to be run so the +/etc/localtime is updated. + +III. Impact + +An incorrect time will be displayed on a system configured to use one +of the affected timezones if the /usr/share/zoneinfo and /etc/localtime +files are not updated, and all applications on the system that rely on +the system time, such as cron(8) and syslog(8), will be affected. + +IV. Workaround + +The system administrator can install an updated timezone database from +the misc/zoneinfo port and run tzsetup(8) to get the timezone database +corrected. + +Applications that store and display times in Coordinated Universal Time +(UTC) are not affected. + +V. Solution + +Please note that some third party software, for instance PHP, Ruby, +Java and Perl, may be using different zoneinfo data source, in such +cases these software has to be updated separately. For software +packages that is installed via package collection, they can be +upgraded by doing a `pkg upgrade'. + +Following the instructions in this Errata Notice will update all of +the zoneinfo files to be the same as what was released with FreeBSD +release. + +Perform one of the following: + +1) Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. + +2) To update your present system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 8.4] +# fetch http://security.FreeBSD.org/patches/EN-14:10/tzdata-8.4.patch +# fetch http://security.FreeBSD.org/patches/EN-14:10/tzdata-8.4.patch.asc +# gpg --verify tzdata-8.4.patch.asc + +[FreeBSD 9.1] +# fetch http://security.FreeBSD.org/patches/EN-14:10/tzdata-9.1.patch +# fetch http://security.FreeBSD.org/patches/EN-14:10/tzdata-9.1.patch.asc +# gpg --verify tzdata-9.1.patch.asc + +[FreeBSD 9.2] +# fetch http://security.FreeBSD.org/patches/EN-14:10/tzdata-9.2.patch +# fetch http://security.FreeBSD.org/patches/EN-14:10/tzdata-9.2.patch.asc +# gpg --verify tzdata-9.2.patch.asc + +[FreeBSD 9.3] +# fetch http://security.FreeBSD.org/patches/EN-14:10/tzdata-9.3.patch +# fetch http://security.FreeBSD.org/patches/EN-14:10/tzdata-9.3.patch.asc +# gpg --verify tzdata-9.3.patch.asc + +[FreeBSD 10.0] +# fetch http://security.FreeBSD.org/patches/EN-14:10/tzdata-10.0.patch +# fetch http://security.FreeBSD.org/patches/EN-14:10/tzdata-10.0.patch.asc +# gpg --verify tzdata-10.0.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart all the affected applications and daemons, or reboot the system. + +3) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +VI. Correction details + +The following list contains the revision numbers of each file that was +corrected in FreeBSD. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/8/ r270814 +releng/8.4/ r273439 +stable/9/ r270815 +releng/9.1/ r273439 +releng/9.2/ r273439 +releng/9.3/ r273438 +stable/10/ r270817 +releng/10.0/ r273439 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + +The latest revision of this Errata Notice is available at +http://security.FreeBSD.org/advisories/FreeBSD-EN-14:10.tzdata.asc +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.0 + +iQIcBAEBCgAGBQJUSA5BAAoJEO1n7NZdz2rnUusP/ijQW4Dsn4R9rMta1e7ZokhN +YR02tSR+CHUYM/ks0AB8s6NYt6VfK7EAeMiIZqM+EK1Sg8RWfG1NsOJ/JR4K9aSk +gbkqDUbJ/ACBz8MkKQegpI4wXJIYd5DipajJncN+960HJ2qu7gY7NSQGTjbfvA// +MIbNLgxpmVDr3BHFYGYW4Y1dBqIWzrjaBX8aURmqOP6KOZ+x2Y0UeNmjCGifQTqv +2yv2Fw8GnPNQpQu5rlPgL9uLn2YVAsCrhz8CXSvf10gEij1fM+COAqbXhxBMEEjs +ZOfUWqtCPL4p/fToiQVsq7g6SzmukxUDbH+kAo4jbZhixGmscPo83sklt3u7++vZ +nNV0ascp0hFN+prDPGZ1nVlAhQtUYOY1RX1fQ1d7yWJhVfy+zJUAbglL6C06+oUr +QX4YLaS2oD4VqCTqM+cGJEgvF8z4CUGy2wPkRsPxWFslmqAewTpOrcOB+xlFDCjo +Rymp1zbusduRm2PAFOaQigtRG7JjW448Q5NkZR+TY5ZlmQLdO55o+x1Sm1FxOGUW +o/tFWH5wzmKidGQq2cSG2fXe4lAbo7kPkc+9cCCrF0OQldjbU27fQXQUROmHHZhE +mJdBBAH4SOX3nGVsZM79zIwTw3rXcekv0hdPoCkHxJySJZO9bDLpTdEip3hLM4Xq +i++VVywJAeUJ752xLXc0 +=hb2R +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-EN-14:11.crypt.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-14:11.crypt.asc Wed Oct 22 20:16:10 2014 (r45862) @@ -0,0 +1,136 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-14:11.crypt Errata Notice + The FreeBSD Project + +Topic: crypt(3) default hashing algorithm + +Category: core +Module: libcrypt +Announced: 2014-10-22 +Affects: FreeBSD 9.3 and FreeBSD 10.0-STABLE after 2014-05-11 and + before 2014-10-16. +Corrected: 2014-10-13 15:56:47 UTC (stable/10, 10.1-PRERELEASE) + 2014-10-16 21:39:04 UTC (releng/10.1, 10.1-RC3) + 2014-10-16 21:39:04 UTC (releng/10.1, 10.1-RC2-p2) + 2014-10-16 21:39:04 UTC (releng/10.1, 10.1-RC1-p2) + 2014-10-16 21:39:04 UTC (releng/10.1, 10.1-BETA3-p2) + 2014-10-21 21:09:54 UTC (stable/9, 9.3-STABLE) + 2014-10-21 23:50:46 UTC (releng/9.3, 9.3-RELEASE-p4) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +The crypt(3) function performs password hashing. Different algorithms +of varying strength are available, with older, weaker algorithms being +retained for compatibility. + +The crypt(3) function was originally based on the DES encryption +algorithm and generated a 13-character hash from an eight-character +password (longer passwords were truncated) and a two-character salt. + +II. Problem Description + +In recent FreeBSD releases, the default algorithm for crypt(3) was +changed to SHA-512, which generates a much longer hash than the +traditional DES-based algorithm. + +III. Impact + +Many applications assume that crypt(3) always returns a traditional DES +hash, and blindly copy it into a short buffer without bounds checks. This +may lead to a variety of undesirable results including, at worst, crashing +the application. + +IV. Workaround + +No workaround is available. + +V. Solution + +Perform one of the following: + +1) Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. + +2) To update your present system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch http://security.FreeBSD.org/patches/EN-14:11/crypt.patch +# fetch http://security.FreeBSD.org/patches/EN-14:11/crypt.patch.asc +# gpg --verify crypt.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart all deamons using the library, or reboot the system. + +3) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +VI. Correction details + +The following list contains the revision numbers of each file that was +corrected in FreeBSD. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/9/ r273425 +releng/9.3/ r273438 +stable/10/ r273043 +releng/10.1/ r273187 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + +The latest revision of this Errata Notice is available at +http://security.FreeBSD.org/advisories/FreeBSD-EN-14:11.crypt.asc + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.0 + +iQIcBAEBCgAGBQJUSAvTAAoJEO1n7NZdz2rnOnsP/0a4Cz7DAc9aW7Ia1aLnGBbZ +HDBF7t+LjVj94PnXxhUWWxGgN5KAsYg1TaXw2b68KyrQYQK/X9mG6Qlu8MWjngaL +fH3bKPV+h2Fog8Y7nEW0QmW5sd863Uo5NxNyDcXU0m4frk7yo+i6yBHlBq07eWGv +6fqDjLiP8+kLLCkDtu+s4e9NfJcc8XMRxCzEseLVorDU/5eZWUx5Mb5NkJWt6vLf +jrPclEEVZrrfsf5zt6MN6ZmwYi85RcW/TwksCT5UzYQeoZlr3BtTsFMqEs8ZYulJ +1kUcml4yV8IstaWm1bq8QMM76zfUHe/OzLbwTcynZofBPSWS4DF1f+GpzHW7z11w +/bNGLFWdXm+mbLjv6GCi/rpplIuTUgdTCUr0yC9iyox9e1a1Ukl6B63PA/nnwzas +OFAKZppMiP8S4/RtyueeBJx+ZASNn+ZPTjiiiV92VxYzIreLYDbClzMFjVqd95Wc +Yt1AYvfeRAPmTLNEGhGbgOKZBX6ZdCZDqQIctvnT/LjmJQ3evSxz+wVge1UnYMit +do71bHIWLrRPZlyyh/bNHT2pXxj2Sdw49rbiJqE7VeJnbo1qlAv5jjxaKF8rs+WZ +hFINgZaoVQ2HdHXgj/dvnKi/D7QrfVBomyRMrYq8YmoniRhu1uqbT2LN8QjMhOnA +MfV6XkrYkUgh3Z74uRyu +=psMc +-----END PGP SIGNATURE----- Added: head/share/security/patches/EN-14:10/tzdata-10.0.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-14:10/tzdata-10.0.patch Wed Oct 22 20:16:10 2014 (r45862) @@ -0,0 +1,9166 @@ +Index: contrib/tzdata/africa +=================================================================== +--- contrib/tzdata/africa (revision 273102) ++++ contrib/tzdata/africa (working copy) +@@ -1,4 +1,3 @@ +-#

+ # This file is in the public domain, so clarified as of
+ # 2009-05-17 by Arthur David Olson.
+ 
+@@ -35,13 +34,13 @@
+ # Previous editions of this database used WAT, CAT, SAT, and EAT
+ # for +0:00 through +3:00, respectively,
+ # but Mark R V Murray reports that
+-# `SAST' is the official abbreviation for +2:00 in the country of South Africa,
+-# `CAT' is commonly used for +2:00 in countries north of South Africa, and
+-# `WAT' is probably the best name for +1:00, as the common phrase for
+-# the area that includes Nigeria is ``West Africa''.
+-# He has heard of ``Western Sahara Time'' for +0:00 but can find no reference.
++# 'SAST' is the official abbreviation for +2:00 in the country of South Africa,
++# 'CAT' is commonly used for +2:00 in countries north of South Africa, and
++# 'WAT' is probably the best name for +1:00, as the common phrase for
++# the area that includes Nigeria is "West Africa".
++# He has heard of "Western Sahara Time" for +0:00 but can find no reference.
+ #
+-# To make things confusing, `WAT' seems to have been used for -1:00 long ago;
++# To make things confusing, 'WAT' seems to have been used for -1:00 long ago;
+ # I'd guess that this was because people needed _some_ name for -1:00,
+ # and at the time, far west Africa was the only major land area in -1:00.
+ # This usage is now obsolete, as the last use of -1:00 on the African
+@@ -54,7 +53,7 @@
+ #	 2:00	SAST	South Africa Standard Time
+ # and Murray suggests the following abbreviation:
+ #	 1:00	WAT	West Africa Time
+-# I realize that this leads to `WAT' being used for both -1:00 and 1:00
++# I realize that this leads to 'WAT' being used for both -1:00 and 1:00
+ # for times before 1976, but this is the best I can think of
+ # until we get more information.
+ #
+@@ -131,9 +130,7 @@ Zone	Africa/Gaborone	1:43:40 -	LMT	1885
+ 			2:00	-	CAT
+ 
+ # Burkina Faso
+-# Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+-Zone Africa/Ouagadougou	-0:06:04 -	LMT	1912
+-			 0:00	-	GMT
++# See Africa/Abidjan.
+ 
+ # Burundi
+ # Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+@@ -161,7 +158,7 @@ Zone	Africa/Bangui	1:14:20	-	LMT	1912
+ 
+ # Chad
+ # Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+-Zone	Africa/Ndjamena	1:00:12 -	LMT	1912
++Zone	Africa/Ndjamena	1:00:12 -	LMT	1912 # N'Djamena
+ 			1:00	-	WAT	1979 Oct 14
+ 			1:00	1:00	WAST	1980 Mar  8
+ 			1:00	-	WAT
+@@ -183,10 +180,20 @@ Zone Africa/Lubumbashi	1:49:52 -	LMT	1897 Nov 9
+ Zone Africa/Brazzaville	1:01:08 -	LMT	1912
+ 			1:00	-	WAT
+ 
+-# Cote D'Ivoire
++# Côte D'Ivoire / Ivory Coast
+ # Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+ Zone	Africa/Abidjan	-0:16:08 -	LMT	1912
+ 			 0:00	-	GMT
++Link Africa/Abidjan Africa/Bamako	# Mali
++Link Africa/Abidjan Africa/Banjul	# Gambia
++Link Africa/Abidjan Africa/Conakry	# Guinea
++Link Africa/Abidjan Africa/Dakar	# Senegal
++Link Africa/Abidjan Africa/Freetown	# Sierra Leone
++Link Africa/Abidjan Africa/Lome		# Togo
++Link Africa/Abidjan Africa/Nouakchott	# Mauritania
++Link Africa/Abidjan Africa/Ouagadougou	# Burkina Faso
++Link Africa/Abidjan Africa/Sao_Tome	# São Tomé and Príncipe
++Link Africa/Abidjan Atlantic/St_Helena	# St Helena
+ 
+ # Djibouti
+ # Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+@@ -231,30 +238,26 @@ Rule	Egypt	1990	1994	-	May	 1	1:00	1:00	S
+ # Egyptians would approve the cancellation."
+ #
+ # Egypt to cancel daylight saving time
+-# 
+ # http://www.almasryalyoum.com/en/node/407168
+-# 
+ # or
+-# 
+ # http://www.worldtimezone.com/dst_news/dst_news_egypt04.html
+-# 
+ Rule	Egypt	1995	2010	-	Apr	lastFri	 0:00s	1:00	S
+-Rule	Egypt	1995	2005	-	Sep	lastThu	23:00s	0	-
++Rule	Egypt	1995	2005	-	Sep	lastThu	24:00	0	-
+ # From Steffen Thorsen (2006-09-19):
+ # The Egyptian Gazette, issue 41,090 (2006-09-18), page 1, reports:
+ # Egypt will turn back clocks by one hour at the midnight of Thursday
+ # after observing the daylight saving time since May.
+ # http://news.gom.com.eg/gazette/pdf/2006/09/18/01.pdf
+-Rule	Egypt	2006	only	-	Sep	21	23:00s	0	-
++Rule	Egypt	2006	only	-	Sep	21	24:00	0	-
+ # From Dirk Losch (2007-08-14):
+ # I received a mail from an airline which says that the daylight
+ # saving time in Egypt will end in the night of 2007-09-06 to 2007-09-07.
+-# From Jesper Norgaard Welen (2007-08-15): [The following agree:]
++# From Jesper Nørgaard Welen (2007-08-15): [The following agree:]
+ # http://www.nentjes.info/Bill/bill5.htm
+ # http://www.timeanddate.com/worldclock/city.html?n=53
+ # From Steffen Thorsen (2007-09-04): The official information...:
+ # http://www.sis.gov.eg/En/EgyptOnline/Miscellaneous/000002/0207000000000000001580.htm
+-Rule	Egypt	2007	only	-	Sep	Thu>=1	23:00s	0	-
++Rule	Egypt	2007	only	-	Sep	Thu>=1	24:00	0	-
+ # From Abdelrahman Hassan (2007-09-06):
+ # Due to the Hijri (lunar Islamic calendar) year being 11 days shorter
+ # than the year of the Gregorian calendar, Ramadan shifts earlier each
+@@ -288,15 +291,9 @@ Rule	Egypt	1995	2010	-	Apr	lastFri	 0:00s	1:00	S
+ #
+ # timeanddate[2] and another site I've found[3] also support that.
+ #
+-# [1] 
+-# https://bugzilla.redhat.com/show_bug.cgi?id=492263
+-# 
+-# [2] 
+-# http://www.timeanddate.com/worldclock/clockchange.html?n=53
+-# 
+-# [3] 
+-# http://wwp.greenwichmeantime.com/time-zone/africa/egypt/
+-# 
++# [1] https://bugzilla.redhat.com/show_bug.cgi?id=492263
++# [2] http://www.timeanddate.com/worldclock/clockchange.html?n=53
++# [3] http://wwp.greenwichmeantime.com/time-zone/africa/egypt/
+ 
+ # From Arthur David Olson (2009-04-20):
+ # In 2009 (and for the next several years), Ramadan ends before the fourth
+@@ -306,14 +303,10 @@ Rule	Egypt	1995	2010	-	Apr	lastFri	 0:00s	1:00	S
+ # From Steffen Thorsen (2009-08-11):
+ # We have been able to confirm the August change with the Egyptian Cabinet
+ # Information and Decision Support Center:
+-# 
+ # http://www.timeanddate.com/news/time/egypt-dst-ends-2009.html
+-# 
+ #
+ # The Middle East News Agency
+-# 
+ # http://www.mena.org.eg/index.aspx
+-# 
+ # also reports "Egypt starts winter time on August 21"
+ # today in article numbered "71, 11/08/2009 12:25 GMT."
+ # Only the title above is available without a subscription to their service,
+@@ -321,26 +314,95 @@ Rule	Egypt	1995	2010	-	Apr	lastFri	 0:00s	1:00	S
+ # (at least today).
+ 
+ # From Alexander Krivenyshev (2010-07-20):
+-# According to News from Egypt -  Al-Masry Al-Youm Egypt's cabinet has
++# According to News from Egypt - Al-Masry Al-Youm Egypt's cabinet has
+ # decided that Daylight Saving Time will not be used in Egypt during
+ # Ramadan.
+ #
+ # Arabic translation:
+-# "Clocks to go back during Ramadan--and then forward again"
+-# 
++# "Clocks to go back during Ramadan - and then forward again"
+ # http://www.almasryalyoum.com/en/news/clocks-go-back-during-ramadan-and-then-forward-again
+-# 
+-# or
+-# 
+ # http://www.worldtimezone.com/dst_news/dst_news_egypt02.html
+-# 
+ 
+-Rule	Egypt	2008	only	-	Aug	lastThu	23:00s	0	-
+-Rule	Egypt	2009	only	-	Aug	20	23:00s	0	-
+-Rule	Egypt	2010	only	-	Aug	11	0:00	0	-
+-Rule	Egypt	2010	only	-	Sep	10	0:00	1:00	S
+-Rule	Egypt	2010	only	-	Sep	lastThu	23:00s	0	-
++# From Ahmad El-Dardiry (2014-05-07):
++# Egypt is to change back to Daylight system on May 15
++# http://english.ahram.org.eg/NewsContent/1/64/100735/Egypt/Politics-/Egypts-government-to-reapply-daylight-saving-time-.aspx
+ 
++# From Gunther Vermier (2015-05-13):
++# our Egypt office confirms that the change will be at 15 May "midnight" (24:00)
++
++# From Imed Chihi (2014-06-04):
++# We have finally "located" a precise official reference about the DST changes
++# in Egypt.  The Ministers Cabinet decision is explained at
++# http://www.cabinet.gov.eg/Media/CabinetMeetingsDetails.aspx?id=347 ...
++# [T]his (Arabic) site is not accessible outside Egypt, but the page ...
++# translates into: "With regard to daylight saving time, it is scheduled to
++# take effect at exactly twelve o'clock this evening, Thursday, 15 MAY 2014,
++# to be suspended by twelve o'clock on the evening of Thursday, 26 JUN 2014,
++# and re-established again at the end of the month of Ramadan, at twelve
++# o'clock on the evening of Thursday, 31 JUL 2014."  This statement has been
++# reproduced by other (more accessible) sites[, e.g.,]...
++# http://elgornal.net/news/news.aspx?id=4699258
++
++# From Paul Eggert (2014-06-04):
++# Sarah El Deeb and Lee Keath of AP report that the Egyptian government says
++# the change is because of blackouts in Cairo, even though Ahram Online (cited
++# above) says DST had no affect on electricity consumption.  There is
++# no information about when DST will end this fall.  See:
++# http://abcnews.go.com/International/wireStory/el-sissi-pushes-egyptians-line-23614833
++#
++# For now, guess that later spring and fall transitions will use
++# 2010's rules, and guess that Egypt will switch to standard time at
++# 24:00 the last Thursday before Ramadan, and back to DST at 00:00 the
++# first Friday after Ramadan.  To implement this,
++# transition dates for 2015 through 2037 were determined by running
++# the following program under GNU Emacs 24.3, with the results integrated
++# by hand into the table below.  Ramadan again intrudes on the guessed
++# DST starting in 2038, but that's beyond our somewhat-arbitrary cutoff.
++# (let ((islamic-year 1436))
++#   (while (< islamic-year 1460)
++#     (let ((a (calendar-islamic-to-absolute (list 9 1 islamic-year)))
++#           (b (calendar-islamic-to-absolute (list 10 1 islamic-year)))
++#           (friday 5))
++#       (while (/= friday (mod a 7))
++#         (setq a (1- a)))
++#       (while (/= friday (mod b 7))
++#         (setq b (1+ b)))
++#       (setq a (1- a))
++#       (setq b (1- b))
++#       (setq a (calendar-gregorian-from-absolute a))
++#       (setq b (calendar-gregorian-from-absolute b))
++#       (insert
++#        (format
++#         (concat "Rule\tEgypt\t%d\tonly\t-\t%s\t%2d\t24:00\t0\t-\n"
++#                 "Rule\tEgypt\t%d\tonly\t-\t%s\t%2d\t24:00\t1:00\tS\n")
++#         (car (cdr (cdr a))) (calendar-month-name (car a) t) (car (cdr a))
++#         (car (cdr (cdr b))) (calendar-month-name (car b) t) (car (cdr b)))))
++#     (setq islamic-year (+ 1 islamic-year))))
++Rule	Egypt	2008	only	-	Aug	lastThu	24:00	0	-
++Rule	Egypt	2009	only	-	Aug	20	24:00	0	-
++Rule	Egypt	2010	only	-	Aug	10	24:00	0	-
++Rule	Egypt	2010	only	-	Sep	 9	24:00	1:00	S
++Rule	Egypt	2010	only	-	Sep	lastThu	24:00	0	-
++Rule	Egypt	2014	only	-	May	15	24:00	1:00	S
++Rule	Egypt	2014	only	-	Jun	26	24:00	0	-
++Rule	Egypt	2014	only	-	Jul	31	24:00	1:00	S
++Rule	Egypt	2014	max	-	Sep	lastThu	24:00	0	-
++Rule	Egypt	2015	2019	-	Apr	lastFri	 0:00s	1:00	S
++Rule	Egypt	2015	only	-	Jun	11	24:00	0	-
++Rule	Egypt	2015	only	-	Jul	23	24:00	1:00	S
++Rule	Egypt	2016	only	-	Jun	 2	24:00	0	-
++Rule	Egypt	2016	only	-	Jul	 7	24:00	1:00	S
++Rule	Egypt	2017	only	-	May	25	24:00	0	-
++Rule	Egypt	2017	only	-	Jun	29	24:00	1:00	S
++Rule	Egypt	2018	only	-	May	10	24:00	0	-
++Rule	Egypt	2018	only	-	Jun	14	24:00	1:00	S
++Rule	Egypt	2019	only	-	May	 2	24:00	0	-
++Rule	Egypt	2019	only	-	Jun	 6	24:00	1:00	S
++Rule	Egypt	2020	only	-	May	28	24:00	1:00	S
++Rule	Egypt	2021	only	-	May	13	24:00	1:00	S
++Rule	Egypt	2022	only	-	May	 5	24:00	1:00	S
++Rule	Egypt	2023	max	-	Apr	lastFri	 0:00s	1:00	S
++
+ # Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+ Zone	Africa/Cairo	2:05:09 -	LMT	1900 Oct
+ 			2:00	Egypt	EE%sT
+@@ -359,10 +421,15 @@ Zone	Africa/Asmara	2:35:32 -	LMT	1870
+ 			3:00	-	EAT
+ 
+ # Ethiopia
+-# From Paul Eggert (2006-03-22):
+-# Shanks & Pottenger write that Ethiopia had six narrowly-spaced time zones
+-# between 1870 and 1890, and that they merged to 38E50 (2:35:20) in 1890.
+-# We'll guess that 38E50 is for Adis Dera.
++# From Paul Eggert (2014-07-31):
++# Like the Swahili of Kenya and Tanzania, many Ethiopians keep a
++# 12-hour clock starting at our 06:00, so their "8 o'clock" is our
++# 02:00 or 14:00.  Keep this in mind when you ask the time in Amharic.
++#
++# Shanks & Pottenger write that Ethiopia had six narrowly-spaced time
++# zones between 1870 and 1890, that they merged to 38E50 (2:35:20) in
++# 1890, and that they switched to 3:00 on 1936-05-05.  Perhaps 38E50
++# was for Adis Dera.  Quite likely the Shanks data are wrong anyway.
+ # Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+ Zone Africa/Addis_Ababa	2:34:48 -	LMT	1870
+ 			2:35:20	-	ADMT	1936 May 5    # Adis Dera MT
+@@ -374,28 +441,24 @@ Zone Africa/Libreville	0:37:48 -	LMT	1912
+ 			1:00	-	WAT
+ 
+ # Gambia
+-# Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+-Zone	Africa/Banjul	-1:06:36 -	LMT	1912
+-			-1:06:36 -	BMT	1935	# Banjul Mean Time
+-			-1:00	-	WAT	1964
+-			 0:00	-	GMT
++# See Africa/Abidjan.
+ 
+ # Ghana
+ # Rule	NAME	FROM	TO	TYPE	IN	ON	AT	SAVE	LETTER/S
+-# Whitman says DST was observed from 1931 to ``the present'';
+-# go with Shanks & Pottenger.
+-Rule	Ghana	1936	1942	-	Sep	 1	0:00	0:20	GHST
+-Rule	Ghana	1936	1942	-	Dec	31	0:00	0	GMT
++# Whitman says DST was observed from 1931 to "the present";
++# Shanks & Pottenger say 1936 to 1942;
++# and September 1 to January 1 is given by:
++# Scott Keltie J, Epstein M (eds), The Statesman's Year-Book,
++# 57th ed. Macmillan, London (1920), OCLC 609408015, pp xxviii.
++# For lack of better info, assume DST was observed from 1920 to 1942.
++Rule	Ghana	1920	1942	-	Sep	 1	0:00	0:20	GHST
++Rule	Ghana	1920	1942	-	Dec	31	0:00	0	GMT
+ # Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+ Zone	Africa/Accra	-0:00:52 -	LMT	1918
+ 			 0:00	Ghana	%s
+ 
+ # Guinea
+-# Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+-Zone	Africa/Conakry	-0:54:52 -	LMT	1912
+-			 0:00	-	GMT	1934 Feb 26
+-			-1:00	-	WAT	1960
+-			 0:00	-	GMT
++# See Africa/Abidjan.
+ 
+ # Guinea-Bissau
+ # Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+@@ -503,18 +566,8 @@ Zone	Africa/Blantyre	2:20:00 -	LMT	1903 Mar
+ 			2:00	-	CAT
+ 
+ # Mali
+-# Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+-Zone	Africa/Bamako	-0:32:00 -	LMT	1912
+-			 0:00	-	GMT	1934 Feb 26
+-			-1:00	-	WAT	1960 Jun 20
+-			 0:00	-	GMT
+-
+ # Mauritania
+-# Zone	NAME		GMTOFF	RULES	FORMAT	[UNTIL]
+-Zone Africa/Nouakchott	-1:03:48 -	LMT	1912
+-			 0:00	-	GMT	1934 Feb 26
+-			-1:00	-	WAT	1960 Nov 28
+-			 0:00	-	GMT
++# See Africa/Abidjan.
+ 
+ # Mauritius
+ 
+@@ -538,9 +591,7 @@ Zone	Africa/Blantyre	2:20:00 -	LMT	1903 Mar
+ 
+ # From Steffen Thorsen (2008-07-10):
+ # According to
+-# 
+ # http://www.lexpress.mu/display_article.php?news_id=111216
+-# 
+ # (in French), Mauritius will start and end their DST a few days earlier
+ # than previously announced (2008-11-01 to 2009-03-31).  The new start
+ # date is 2008-10-26 at 02:00 and the new end date is 2009-03-27 (no time
+@@ -559,18 +610,13 @@ Zone	Africa/Blantyre	2:20:00 -	LMT	1903 Mar
+ # published on Monday, June 30, 2008...
+ #
+ # I guess that article in French "Le gouvernement avance l'introduction
+-# de l'heure d'ete" stating that DST in Mauritius starting on October 26
+-# and ending on March 27, 2009 is the most recent one.
+-# ...
+-# 
++# de l'heure d'été" stating that DST in Mauritius starting on October 26
++# and ending on March 27, 2009 is the most recent one....
+ # http://www.worldtimezone.com/dst_news/dst_news_mauritius02.html
+-# 
+ 
+ # From Riad M. Hossen Ally (2008-08-03):
+ # The Government of Mauritius weblink
+-# 
+ # http://www.gov.mu/portal/site/pmosite/menuitem.4ca0efdee47462e7440a600248a521ca/?content_id=4728ca68b2a5b110VgnVCM1000000a04a8c0RCRD
+-# 
+ # Cabinet Decision of July 18th, 2008 states as follows:
+ #
+ # 4. ...Cabinet has agreed to the introduction into the National Assembly
+@@ -580,7 +626,7 @@ Zone	Africa/Blantyre	2:20:00 -	LMT	1903 Mar
+ # States of America. It will start at two o'clock in the morning on the
+ # last Sunday of October and will end at two o'clock in the morning on
+ # the last Sunday of March the following year. The summer time for the
+-# year 2008 - 2009 will, therefore, be effective as from 26 October 2008
++# year 2008-2009 will, therefore, be effective as from 26 October 2008
+ # and end on 29 March 2009.
+ 
+ # From Ed Maste (2008-10-07):
+@@ -587,9 +633,7 @@ Zone	Africa/Blantyre	2:20:00 -	LMT	1903 Mar
+ # THE TIME BILL (No. XXVII of 2008) Explanatory Memorandum states the
+ # beginning / ending of summer time is 2 o'clock standard time in the
+ # morning of the last Sunday of October / last Sunday of March.
+-# 
+ # http://www.gov.mu/portal/goc/assemblysite/file/bill2708.pdf
+-# 
+ 
+ # From Steffen Thorsen (2009-06-05):
+ # According to several sources, Mauritius will not continue to observe
+@@ -596,17 +640,11 @@ Zone	Africa/Blantyre	2:20:00 -	LMT	1903 Mar
+ # DST the coming summer...
+ #
+ # Some sources, in French:
+-# 
+ # http://www.defimedia.info/news/946/Rashid-Beebeejaun-:-%C2%AB-L%E2%80%99heure-d%E2%80%99%C3%A9t%C3%A9-ne-sera-pas-appliqu%C3%A9e-cette-ann%C3%A9e-%C2%BB
+-# 
+-# 
+ # http://lexpress.mu/Story/3398~Beebeejaun---Les-objectifs-d-%C3%A9conomie-d-%C3%A9nergie-de-l-heure-d-%C3%A9t%C3%A9-ont-%C3%A9t%C3%A9-atteints-
+-# 
+ #
+ # Our wrap-up:
+-# 
+ # http://www.timeanddate.com/news/time/mauritius-dst-will-not-repeat.html
+-# 
+ 
+ # From Arthur David Olson (2009-07-11):
+ # The "mauritius-dst-will-not-repeat" wrapup includes this:
+@@ -630,7 +668,7 @@ Zone	Indian/Mayotte	3:00:56 -	LMT	1911 Jul	# Mamou
+ 			3:00	-	EAT
+ 
+ # Morocco
+-# See the `europe' file for Spanish Morocco (Africa/Ceuta).
++# See the 'europe' file for Spanish Morocco (Africa/Ceuta).
+ 
+ # From Alex Krivenyshev (2008-05-09):
+ # Here is an article that Morocco plan to introduce Daylight Saving Time between
+@@ -638,21 +676,14 @@ Zone	Indian/Mayotte	3:00:56 -	LMT	1911 Jul	# Mamou
+ #
+ # "... Morocco is to save energy by adjusting its clock during summer so it will
+ # be one hour ahead of GMT between 1 June and 27 September, according to
+-# Communication Minister and Gov ernment Spokesman, Khalid Naciri...."
++# Communication Minister and Government Spokesman, Khalid Naciri...."
+ #
+-# 
+ # http://www.worldtimezone.net/dst_news/dst_news_morocco01.html
+-# 
+-# OR
+-# 
+ # http://en.afrik.com/news11892.html
+-# 
+ 
+ # From Alex Krivenyshev (2008-05-09):
+ # The Morocco time change can be confirmed on Morocco web site Maghreb Arabe Presse:
+-# 
+ # http://www.map.ma/eng/sections/box3/morocco_shifts_to_da/view
+-# 
+ #
+ # Morocco shifts to daylight time on June 1st through September 27, Govt.
+ # spokesman.
+@@ -659,39 +690,29 @@ Zone	Indian/Mayotte	3:00:56 -	LMT	1911 Jul	# Mamou
+ 
+ # From Patrice Scattolin (2008-05-09):
+ # According to this article:
+-# 
+ # http://www.avmaroc.com/actualite/heure-dete-comment-a127896.html
+-# 
+-# (and republished here:
+-# 
+-# http://www.actu.ma/heure-dete-comment_i127896_0.html
+-# 
+-# )
+-# the changes occurs at midnight:
++# (and republished here: )
++# the changes occur at midnight:
+ #
+-# saturday night may 31st at midnight (which in french is to be
+-# intrepreted as the night between saturday and sunday)
+-# sunday night the 28th  at midnight
++# Saturday night May 31st at midnight (which in French is to be
++# interpreted as the night between Saturday and Sunday)
++# Sunday night the 28th at midnight
+ #
+-# Seeing that the 28th is monday, I am guessing that she intends to say
+-# the midnight of the 28th which is the midnight between sunday and
+-# monday, which jives with other sources that say that it's inclusive
+-# june1st to sept 27th.
++# Seeing that the 28th is Monday, I am guessing that she intends to say
++# the midnight of the 28th which is the midnight between Sunday and
++# Monday, which jives with other sources that say that it's inclusive
++# June 1st to Sept 27th.
+ #
+ # The decision was taken by decree *2-08-224 *but I can't find the decree
+ # published on the web.
+ #
+ # It's also confirmed here:
+-# 
+ # http://www.maroc.ma/NR/exeres/FACF141F-D910-44B0-B7FA-6E03733425D1.htm
+-# 
+-# on a government portal as being  between june 1st and sept 27th (not yet
+-# posted in english).
++# on a government portal as being between June 1st and Sept 27th (not yet
++# posted in English).
+ #
+-# The following google query will generate many relevant hits:
+-# 
++# The following Google query will generate many relevant hits:
+ # http://www.google.com/search?hl=en&q=Conseil+de+gouvernement+maroc+heure+avance&btnG=Search
+-# 
+ 
+ # From Steffen Thorsen (2008-08-27):
+ # Morocco will change the clocks back on the midnight between August 31
+@@ -699,34 +720,24 @@ Zone	Indian/Mayotte	3:00:56 -	LMT	1911 Jul	# Mamou
+ # of September:
+ #
+ # One article about it (in French):
+-# 
+ # http://www.menara.ma/fr/Actualites/Maroc/Societe/ci.retour_a_l_heure_gmt_a_partir_du_dimanche_31_aout_a_minuit_officiel_.default
+-# 
+ #
+ # We have some further details posted here:
+-# 
+ # http://www.timeanddate.com/news/time/morocco-ends-dst-early-2008.html
+-# 
+ 
+ # From Steffen Thorsen (2009-03-17):
+ # Morocco will observe DST from 2009-06-01 00:00 to 2009-08-21 00:00 according
+ # to many sources, such as
+-# 
+ # http://news.marweb.com/morocco/entertainment/morocco-daylight-saving.html
+-# 
+-# 
+ # http://www.medi1sat.ma/fr/depeche.aspx?idp=2312
+-# 
+ # (French)
+ #
+ # Our summary:
+-# 
+ # http://www.timeanddate.com/news/time/morocco-starts-dst-2009.html
+-# 
+ 
+ # From Alexander Krivenyshev (2009-03-17):
+ # Here is a link to official document from Royaume du Maroc Premier Ministre,
+-# Ministere de la Modernisation des Secteurs Publics
++# Ministère de la Modernisation des Secteurs Publics
+ #
+ # Under Article 1 of Royal Decree No. 455-67 of Act 23 safar 1387 (2 june 1967)
+ # concerning the amendment of the legal time, the Ministry of Modernization of
+@@ -733,13 +744,8 @@ Zone	Indian/Mayotte	3:00:56 -	LMT	1911 Jul	# Mamou
+ # Public Sectors announced that the official time in the Kingdom will be
+ # advanced 60 minutes from Sunday 31 May 2009 at midnight.
+ #
+-# 
+ # http://www.mmsp.gov.ma/francais/Actualites_fr/PDF_Actualites_Fr/HeureEte_FR.pdf
+-# 
+-#
+-# 
+ # http://www.worldtimezone.com/dst_news/dst_news_morocco03.html
+-# 
+ 
+ # From Steffen Thorsen (2010-04-13):
+ # Several news media in Morocco report that the Ministry of Modernization
+@@ -747,14 +753,10 @@ Zone	Indian/Mayotte	3:00:56 -	LMT	1911 Jul	# Mamou
+ # 2010-05-02 to 2010-08-08.
+ #
+ # Example:
+-# 
+ # http://www.lavieeco.com/actualites/4099-le-maroc-passera-a-l-heure-d-ete-gmt1-le-2-mai.html
+-# 
+ # (French)
+ # Our page:
+-# 
+ # http://www.timeanddate.com/news/time/morocco-starts-dst-2010.html
+-# 
+ 
+ # From Dan Abitol (2011-03-30):
+ # ...Rules for Africa/Casablanca are the following (24h format)
+@@ -764,34 +766,20 @@ Zone	Indian/Mayotte	3:00:56 -	LMT	1911 Jul	# Mamou
+ # The change was broadcast on the FM Radio
+ # I ve called ANRT (telecom regulations in Morocco) at
+ # +212.537.71.84.00
+-# 
+ # http://www.anrt.net.ma/fr/
+-# 
+ # They said that
+-# 
+ # http://www.map.ma/fr/sections/accueil/l_heure_legale_au_ma/view
+-# 
+ # is the official publication to look at.
+ # They said that the decision was already taken.
+ #
+ # More articles in the press
+-# 
+-# http://www.yabiladi.com/articles/details/5058/secret-l-heure-d-ete-maroc-lev
+-# 
+-# e.html
+-# 
++# http://www.yabiladi.com/articles/details/5058/secret-l-heure-d-ete-maroc-leve.html
+ # http://www.lematin.ma/Actualite/Express/Article.asp?id=148923
+-# 
+-# 
+ # http://www.lavieeco.com/actualite/Le-Maroc-passe-sur-GMT%2B1-a-partir-de-dim
+-# anche-prochain-5538.html
+-# 
+ 
+ # From Petr Machata (2011-03-30):
+ # They have it written in English here:
+-# 
+ # http://www.map.ma/eng/sections/home/morocco_to_spring_fo/view
+-# 
+ #
+ # It says there that "Morocco will resume its standard time on July 31,
+ # 2011 at midnight." Now they don't say whether they mean midnight of
+@@ -799,20 +787,16 @@ Zone	Indian/Mayotte	3:00:56 -	LMT	1911 Jul	# Mamou
+ # also been like that in the past.
+ 
+ # From Alexander Krivenyshev (2012-03-09):
+-# According to Infomédiaire web site from Morocco (infomediaire.ma),
+-# on March 9, 2012, (in French) Heure légale:
+-# Le Maroc adopte officiellement l'heure d'été
+-# 
++# According to Infomédiaire web site from Morocco (infomediaire.ma),
++# on March 9, 2012, (in French) Heure légale:
++# Le Maroc adopte officiellement l'heure d'été
+ # http://www.infomediaire.ma/news/maroc/heure-l%C3%A9gale-le-maroc-adopte-officiellement-lheure-d%C3%A9t%C3%A9
+-# 
+ # Governing Council adopted draft decree, that Morocco DST starts on
+ # the last Sunday of March (March 25, 2012) and ends on
+ # last Sunday of September (September 30, 2012)
+ # except the month of Ramadan.
+ # or (brief)
+-# 
+ # http://www.worldtimezone.com/dst_news/dst_news_morocco06.html
+-# 
+ 
+ # From Arthur David Olson (2012-03-10):
+ # The infomediaire.ma source indicates that the system is to be in
+@@ -823,17 +807,13 @@ Zone	Indian/Mayotte	3:00:56 -	LMT	1911 Jul	# Mamou
+ 
+ # From Christophe Tropamer (2012-03-16):
+ # Seen Morocco change again:
+-# 
+ # http://www.le2uminutes.com/actualite.php
+-# 
+-# "...à partir du dernier dimance d'avril et non fins mars,
+-# comme annoncé précédemment."
++# "...à partir du dernier dimanche d'avril et non fins mars,
++# comme annoncé précédemment."
+ 
+ # From Milamber Space Network (2012-07-17):
+ # The official return to GMT is announced by the Moroccan government:
+-# 
+ # http://www.mmsp.gov.ma/fr/actualites.aspx?id=288 [in French]
+-# 
+ #
+ # Google translation, lightly edited:
+ # Back to the standard time of the Kingdom (GMT)
+@@ -868,39 +848,39 @@ Zone	Indian/Mayotte	3:00:56 -	LMT	1911 Jul	# Mamou
+ # Another source (specifying the time for start and end in the decree):
+ # http://www.lemag.ma/Heure-d-ete-au-Maroc-jusqu-au-27-octobre_a75620.html
+ 
+-# From Paul Eggert (2013-10-03):
+-# To estimate what the Moroccan government will do in future years,
+-# transition dates for 2014 through 2038 were determined by running
+-# the following program under GNU Emacs 24.3:
+-#
+-# (let ((islamic-year 1435))
+-#   (while (< islamic-year 1461)
+-#     (let ((a
+-#	     (calendar-gregorian-from-absolute
+-#	      (calendar-islamic-to-absolute (list 9 1 islamic-year))))
+-#	    (b
+-#	     (calendar-gregorian-from-absolute
+-#	      (calendar-islamic-to-absolute (list 10 1 islamic-year)))))
+-#	(insert
+-#	 (format
+-#	  (concat "Rule\tMorocco\t%d\tonly\t-\t%s\t %2d\t 3:00\t0\t-\n"
+-#		  "Rule\tMorocco\t%d\tonly\t-\t%s\t %2d\t 2:00\t1:00\tS\n")
+-#	  (car (cdr (cdr a))) (calendar-month-name (car a) t) (car (cdr a))
+-#	  (car (cdr (cdr b))) (calendar-month-name (car b) t) (car (cdr b)))))
++# From Sebastien Willemijns (2014-03-18):
++# http://www.afriquinfos.com/articles/2014/3/18/maroc-heure-dete-avancez-tous-horloges-247891.asp
++
++# From Milamber Space Network (2014-06-05):
++# The Moroccan government has recently announced that the country will return
++# to standard time at 03:00 on Saturday, June 28, 2014 local time....  DST
++# will resume again at 02:00 on Saturday, August 2, 2014....
++# http://www.mmsp.gov.ma/fr/actualites.aspx?id=586
++
++# From Paul Eggert (2014-06-05):
++# For now, guess that later spring and fall transitions will use 2014's rules,
++# and guess that Morocco will switch to standard time at 03:00 the last
++# Saturday before Ramadan, and back to DST at 02:00 the first Saturday after
++# Ramadan.  To implement this, transition dates for 2015 through 2037 were
++# determined by running the following program under GNU Emacs 24.3, with the
++# results integrated by hand into the table below.
++# (let ((islamic-year 1436))
++#   (while (< islamic-year 1460)
++#     (let ((a (calendar-islamic-to-absolute (list 9 1 islamic-year)))
++#           (b (calendar-islamic-to-absolute (list 10 1 islamic-year)))
++#           (saturday 6))
++#       (while (/= saturday (mod (setq a (1- a)) 7)))
++#       (while (/= saturday (mod b 7))
++#         (setq b (1+ b)))

*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***

From owner-svn-doc-head@FreeBSD.ORG  Thu Oct 23 12:35:17 2014
Return-Path: 
Delivered-To: svn-doc-head@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
 [IPv6:2001:1900:2254:206a::19:1])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by hub.freebsd.org (Postfix) with ESMTPS id 466D0E2F;
 Thu, 23 Oct 2014 12:35:17 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
 [IPv6:2001:1900:2254:2068::e6a:0])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mx1.freebsd.org (Postfix) with ESMTPS id 328E6E51;
 Thu, 23 Oct 2014 12:35:17 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
 by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9NCZHmT016849;
 Thu, 23 Oct 2014 12:35:17 GMT (envelope-from ak@FreeBSD.org)
Received: (from ak@localhost)
 by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9NCZHnm016848;
 Thu, 23 Oct 2014 12:35:17 GMT (envelope-from ak@FreeBSD.org)
Message-Id: <201410231235.s9NCZHnm016848@svn.freebsd.org>
X-Authentication-Warning: svn.freebsd.org: ak set sender to ak@FreeBSD.org
 using -f
From: Alex Kozlov 
Date: Thu, 23 Oct 2014 12:35:17 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
 svn-doc-head@freebsd.org
Subject: svn commit: r45863 -
 head/en_US.ISO8859-1/books/porters-handbook/security
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.18-1
Precedence: list
List-Id: SVN commit messages for the doc tree for head
 
List-Unsubscribe: ,
 
List-Archive: 
List-Post: 
List-Help: 
List-Subscribe: ,
 
X-List-Received-Date: Thu, 23 Oct 2014 12:35:17 -0000

Author: ak (ports committer)
Date: Thu Oct 23 12:35:16 2014
New Revision: 45863
URL: https://svnweb.freebsd.org/changeset/doc/45863

Log:
  - Fix badly wrapped line
  
  Approved by:	mat (portmgr)

Modified:
  head/en_US.ISO8859-1/books/porters-handbook/security/chapter.xml

Modified: head/en_US.ISO8859-1/books/porters-handbook/security/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/security/chapter.xml	Wed Oct 22 20:16:10 2014	(r45862)
+++ head/en_US.ISO8859-1/books/porters-handbook/security/chapter.xml	Thu Oct 23 12:35:16 2014	(r45863)
@@ -451,8 +451,7 @@
       Now check whether the right package versions are matched
 	by the entry:
 
-      &prompt.user; pkg audit -f ${PORTSDIR}/security/vuxml/vuln.xml dropbear-201
-3.58 dropbear-2013.59
+      &prompt.user; pkg audit -f ${PORTSDIR}/security/vuxml/vuln.xml dropbear-2013.58 dropbear-2013.59
 dropbear-2012.58 is vulnerable:
 dropbear -- exposure of sensitive information, DoS
 CVE: CVE-2013-4434

From owner-svn-doc-head@FreeBSD.ORG  Thu Oct 23 17:24:55 2014
Return-Path: 
Delivered-To: svn-doc-head@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by hub.freebsd.org (Postfix) with ESMTPS id C0CD28EA;
 Thu, 23 Oct 2014 17:24:55 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
 [IPv6:2001:1900:2254:2068::e6a:0])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mx1.freebsd.org (Postfix) with ESMTPS id AD9EC390;
 Thu, 23 Oct 2014 17:24:55 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
 by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9NHOt9x053777;
 Thu, 23 Oct 2014 17:24:55 GMT (envelope-from gjb@FreeBSD.org)
Received: (from gjb@localhost)
 by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9NHOtm6053776;
 Thu, 23 Oct 2014 17:24:55 GMT (envelope-from gjb@FreeBSD.org)
Message-Id: <201410231724.s9NHOtm6053776@svn.freebsd.org>
X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org
 using -f
From: Glen Barber 
Date: Thu, 23 Oct 2014 17:24:55 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
 svn-doc-head@freebsd.org
Subject: svn commit: r45864 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.18-1
Precedence: list
List-Id: SVN commit messages for the doc tree for head
 
List-Unsubscribe: ,
 
List-Archive: 
List-Post: 
List-Help: 
List-Subscribe: ,
 
X-List-Received-Date: Thu, 23 Oct 2014 17:24:55 -0000

Author: gjb
Date: Thu Oct 23 17:24:54 2014
New Revision: 45864
URL: https://svnweb.freebsd.org/changeset/doc/45864

Log:
  Update betarel.vers to reflect 10.1-RC3 images are available.
  
  Approved by:	re (implicit)
  Sponsored by:	The FreeBSD Foundation

Modified:
  head/share/xml/release.ent

Modified: head/share/xml/release.ent
==============================================================================
--- head/share/xml/release.ent	Thu Oct 23 12:35:16 2014	(r45863)
+++ head/share/xml/release.ent	Thu Oct 23 17:24:54 2014	(r45864)
@@ -41,7 +41,7 @@
 
 
 
-
+
 
 
 
 
   
@@ -37,6 +37,23 @@
       10
 
       
+	23
+
+	
+	  &os; 10.1-RC3 ¸ø³«
+
+	  

&os; 10.1 ¥ê¥ê¡¼¥¹¥µ¥¤¥¯¥ë¤«¤é + 3 ²óÌܤΥê¥ê¡¼¥¹¸õÊäÈǤ¬¸ø³«¤µ¤ì¤Þ¤·¤¿ (¥¢¥Ê¥¦¥ó¥¹)¡£ + &os; + ¥ß¥é¡¼¥µ¥¤¥È ¤«¤é amd64, armv6, i386, ia64, powerpc, + powerpc64 ¤ª¤è¤Ó sparc64 ¥¢¡¼¥­¥Æ¥¯¥Á¥ã¤Î + ISO ¥¤¥á¡¼¥¸¤òÆþ¼ê¤Ç¤­¤Þ¤¹¡£

+
+
+ + 14 From owner-svn-doc-head@FreeBSD.ORG Fri Oct 24 16:08:30 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 7D54B2D1; Fri, 24 Oct 2014 16:08:30 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 69CF2909; Fri, 24 Oct 2014 16:08:30 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9OG8UAV099367; Fri, 24 Oct 2014 16:08:30 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9OG8ULV099366; Fri, 24 Oct 2014 16:08:30 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201410241608.s9OG8ULV099366@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Fri, 24 Oct 2014 16:08:30 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45869 - head/en_US.ISO8859-1/htdocs/releases/10.1R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Oct 2014 16:08:30 -0000 Author: gjb Date: Fri Oct 24 16:08:29 2014 New Revision: 45869 URL: https://svnweb.freebsd.org/changeset/doc/45869 Log: Adjustments to the 10.1-RELEASE schedule: - Add 10.1-RC4 as a late addition. - Adjust the dates for 10.1-RELEASE builds and announcement. Approved by: re (implicit) Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/schedule.xml Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/schedule.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.1R/schedule.xml Fri Oct 24 15:19:57 2014 (r45868) +++ head/en_US.ISO8859-1/htdocs/releases/10.1R/schedule.xml Fri Oct 24 16:08:29 2014 (r45869) @@ -131,15 +131,24 @@ + RC4 builds begin * + 29 October 2014 + - + Fourth release candidate. + + + RELEASE builds begin - 24 October 2014 + 24 October 2014
+ 5 November 2014 - &local.rel;-RELEASE builds begin. RELEASE announcement - 29 October 2014 + 29 October 2014
+ 10 November 2014 - &local.rel;-RELEASE press release. @@ -154,6 +163,9 @@ +

"*" indicates late additions to the + schedule.

+

Status / TODO

&os; Release Engineering TODO Page From owner-svn-doc-head@FreeBSD.ORG Fri Oct 24 16:15:56 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 60A60655; Fri, 24 Oct 2014 16:15:56 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C485A24; Fri, 24 Oct 2014 16:15:56 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9OGFu1r004163; Fri, 24 Oct 2014 16:15:56 GMT (envelope-from matthew@FreeBSD.org) Received: (from matthew@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9OGFuVn004162; Fri, 24 Oct 2014 16:15:56 GMT (envelope-from matthew@FreeBSD.org) Message-Id: <201410241615.s9OGFuVn004162@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: matthew set sender to matthew@FreeBSD.org using -f From: Matthew Seaman Date: Fri, 24 Oct 2014 16:15:56 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45870 - head/en_US.ISO8859-1/articles/contributors X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Oct 2014 16:15:56 -0000 Author: matthew (ports committer) Date: Fri Oct 24 16:15:55 2014 New Revision: 45870 URL: https://svnweb.freebsd.org/changeset/doc/45870 Log: Add new committer: Tim Little Modified: head/en_US.ISO8859-1/articles/contributors/contrib.additional.xml Modified: head/en_US.ISO8859-1/articles/contributors/contrib.additional.xml ============================================================================== --- head/en_US.ISO8859-1/articles/contributors/contrib.additional.xml Fri Oct 24 16:08:29 2014 (r45869) +++ head/en_US.ISO8859-1/articles/contributors/contrib.additional.xml Fri Oct 24 16:15:55 2014 (r45870) @@ -10136,6 +10136,11 @@ + Tim Little + tim@wallago.co.uk + + + Tim Niemueller tim@niemueller.de From owner-svn-doc-head@FreeBSD.ORG Fri Oct 24 17:04:30 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 11A4BEF5; Fri, 24 Oct 2014 17:04:30 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id F1E60F76; Fri, 24 Oct 2014 17:04:29 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9OH4T6O033547; Fri, 24 Oct 2014 17:04:29 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9OH4T2K033546; Fri, 24 Oct 2014 17:04:29 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201410241704.s9OH4T2K033546@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Fri, 24 Oct 2014 17:04:29 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45871 - head/en_US.ISO8859-1/htdocs/releng X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Oct 2014 17:04:30 -0000 Author: gjb Date: Fri Oct 24 17:04:29 2014 New Revision: 45871 URL: https://svnweb.freebsd.org/changeset/doc/45871 Log: Update the anticipated timeframe for 10.1-RELEASE. Approved by: re (implicit) Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releng/index.xml Modified: head/en_US.ISO8859-1/htdocs/releng/index.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releng/index.xml Fri Oct 24 16:15:55 2014 (r45870) +++ head/en_US.ISO8859-1/htdocs/releng/index.xml Fri Oct 24 17:04:29 2014 (r45871) @@ -50,7 +50,7 @@ - October 2014 + November 2014 &os; 10.1 Target Schedule From owner-svn-doc-head@FreeBSD.ORG Fri Oct 24 21:43:18 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 69740501; Fri, 24 Oct 2014 21:43:18 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 506A81DA; Fri, 24 Oct 2014 21:43:18 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9OLhIjN065395; Fri, 24 Oct 2014 21:43:18 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9OLhIJM065394; Fri, 24 Oct 2014 21:43:18 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201410242143.s9OLhIJM065394@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Fri, 24 Oct 2014 21:43:18 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45872 - head/en_US.ISO8859-1/htdocs/releases/10.1R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Oct 2014 21:43:18 -0000 Author: gjb Date: Fri Oct 24 21:43:17 2014 New Revision: 45872 URL: https://svnweb.freebsd.org/changeset/doc/45872 Log: Regenerate after r273608 Approved by: re (implicit) Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/relnotes.html Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/relnotes.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.1R/relnotes.html Fri Oct 24 17:04:29 2014 (r45871) +++ head/en_US.ISO8859-1/htdocs/releases/10.1R/relnotes.html Fri Oct 24 21:43:17 2014 (r45872) @@ -1,5 +1,5 @@ -FreeBSD 10.1-RELEASE Release Notes

FreeBSD 10.1-RELEASE Release Notes

The FreeBSD Project

FreeBSD 10.1-RELEASE Release Notes

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

IBM, AIX, OS/2, PowerPC, PS/2, S/390, and ThinkPad are @@ -18,7 +18,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

Last modified on 2014-10-21 by gjb.
Abstract

The release notes for FreeBSD 10.1-RELEASE contain + ® symbol.

Last modified on 2014-10-24 by gjb.
Abstract

The release notes for FreeBSD 10.1-RELEASE contain a summary of the changes made to the FreeBSD base system on the 10.1-STABLE development line. This document lists applicable security advisories that were issued since the last @@ -715,8 +715,7 @@ (Sponsored by DARPA, AFRL)

The unbound(8) caching resolver and ldns have been updated to version - 1.4.22. [r269257]

OpenSSL has - been updated to version 1.0.1i. [r269686]

The lite version of + 1.4.22. [r269257]

The lite version of Subversion included in the FreeBSD base system and its dependencies have been updated: [r269847]

  • apr has been @@ -729,7 +728,8 @@ FTP server has been removed from the FreeBSD base system. [r270415]

    The timezone database has been updated to version tzdata2014f. [r270817]

    OpenPAM has - been updated to Ourouparia (20140912). [r271947]

2.5. Ports/Packages Collection Infrastructure

The pkg(8) package management utility has been + been updated to Ourouparia (20140912). [r271947]

OpenSSL has + been updated to version 1.0.1j. [r273399]

2.5. Ports/Packages Collection Infrastructure

The pkg(8) package management utility has been updated to version 1.3.8.

2.6. Release Engineering and Integration

The services.mkdb(8) utility has been updated to include endianness awareness, allowing the services.db database to be created as From owner-svn-doc-head@FreeBSD.ORG Sat Oct 25 01:18:11 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id BEF983D2; Sat, 25 Oct 2014 01:18:11 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A63EB972; Sat, 25 Oct 2014 01:18:11 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9P1IBZW066919; Sat, 25 Oct 2014 01:18:11 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9P1IBwd066918; Sat, 25 Oct 2014 01:18:11 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201410250118.s9P1IBwd066918@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Sat, 25 Oct 2014 01:18:11 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45873 - head/en_US.ISO8859-1/htdocs/releases/10.1R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 25 Oct 2014 01:18:11 -0000 Author: gjb Date: Sat Oct 25 01:18:10 2014 New Revision: 45873 URL: https://svnweb.freebsd.org/changeset/doc/45873 Log: Regen after r273620 Approved by: re (implicit) Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html Fri Oct 24 21:43:17 2014 (r45872) +++ head/en_US.ISO8859-1/htdocs/releases/10.1R/errata.html Sat Oct 25 01:18:10 2014 (r45873) @@ -1,5 +1,5 @@ -FreeBSD 10.1-RELEASE Errata

FreeBSD 10.1-RELEASE Errata

The FreeBSD Project

FreeBSD 10.1-RELEASE Errata

The FreeBSD Project

FreeBSD is a registered trademark of the FreeBSD Foundation.

Intel, Celeron, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered @@ -13,7 +13,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

Last modified on 2014-10-14 by gjb.
Abstract

This document lists errata items for FreeBSD 10.1-RELEASE, + ® symbol.

Last modified on 2014-10-25 by gjb.
Abstract

This document lists errata items for FreeBSD 10.1-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information @@ -49,7 +49,34 @@ boot

/boot/loader.conf after a boot. It disables unmapped I/O at every boot:

vfs.unmapped_buf_allowed=0

[2014-04-03 update] It has been reported that instability may be present on virtual machines running - on other hypervisors, such as Xen or KVM.

4. Late-Breaking News

No news.

This file, and other release-related documents, + on other hypervisors, such as Xen or KVM.

  • FreeBSD/i386 10.1-RELEASE configured with + a multi-disk ZFS dataset (mirror, raidz1, raidz2, raidz3) + may crash during boot when the ZFS pool mount is attempted + while booting an unmodified GENERIC + kernel.

    As described in /usr/src/UPDATING + entry 20121223, rebuilding the kernel + with options KSTACK_PAGES=4 has been + observed to resolve the boot-time crash. This, however, is + not an ideal solution for inclusion in the + GENERIC kernel configuration, as + increasing KSTACK_PAGES implicitly + decreases available usermode threads in an environment that + is already resource-starved.

    Taking into account the heavy resource requirements of + ZFS, in addition to the i386-specific tuning + requirements for general workloads, using ZFS with the + FreeBSD/i386 GENERIC kernel + is strongly discouraged.

    Warning:

    It is extremely important to take note that, by + default, freebsd-update(8) will install the + GENERIC kernel configuration, and + as such, freebsd-update(8) consumers are strongly + encouraged to avoid FreeBSD-provided kernel binary upgrades + with such configurations.

    Note:

    Although there is slight change in how the crash + manifests on FreeBSD/i386 between 10.0-RELEASE and + 10.1-RELEASE, and given the date of the + /usr/src/UPDATING entry, there is no + evidence suggesting this is a regression between + FreeBSD 10.0-RELEASE and FreeBSD 10.1-RELEASE + directly.

  • 4. Late-Breaking News

    No news.

    This file, and other release-related documents, can be downloaded from http://www.FreeBSD.org/releases/.

    For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

    All users of FreeBSD 10.1-STABLE should From owner-svn-doc-head@FreeBSD.ORG Sat Oct 25 13:45:38 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9A9CD4F9; Sat, 25 Oct 2014 13:45:38 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 86A4C936; Sat, 25 Oct 2014 13:45:38 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s9PDjcm8016473; Sat, 25 Oct 2014 13:45:38 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s9PDjcIJ016472; Sat, 25 Oct 2014 13:45:38 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201410251345.s9PDjcIJ016472@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Sat, 25 Oct 2014 13:45:38 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r45874 - head/ja_JP.eucJP/share/xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 25 Oct 2014 13:45:38 -0000 Author: ryusuke Date: Sat Oct 25 13:45:37 2014 New Revision: 45874 URL: https://svnweb.freebsd.org/changeset/doc/45874 Log: - Merge the following from the English version: r45806 -> r45816 head/ja_JP.eucJP/share/xml/navibar.l10n.ent Modified: head/ja_JP.eucJP/share/xml/navibar.l10n.ent Modified: head/ja_JP.eucJP/share/xml/navibar.l10n.ent ============================================================================== --- head/ja_JP.eucJP/share/xml/navibar.l10n.ent Sat Oct 25 01:18:10 2014 (r45873) +++ head/ja_JP.eucJP/share/xml/navibar.l10n.ent Sat Oct 25 13:45:37 2014 (r45874) @@ -1,7 +1,7 @@ - + @@ -80,7 +80,7 @@ ¼¡²ó¥ê¥ê¡¼¥¹Í½Äê:
    &betarel.current; +

  • ¼¡²ó¥ê¥ê¡¼¥¹Í½Äê:
    &betarel.current;
  • '> ]]>