From owner-freebsd-announce@freebsd.org Wed Mar 16 23:20:30 2016 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A1431AD2E59 for ; Wed, 16 Mar 2016 23:20:30 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 9956AE0B; Wed, 16 Mar 2016 23:20:30 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1025) id 97E331E66; Wed, 16 Mar 2016 23:20:30 +0000 (UTC) From: FreeBSD Security Advisories To: FreeBSD Security Advisories Reply-To: freebsd-security@freebsd.org Precedence: bulk Message-Id: <20160316232030.97E331E66@freefall.freebsd.org> Date: Wed, 16 Mar 2016 23:20:30 +0000 (UTC) Subject: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-16:14.openssh X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.21 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Mar 2016 23:20:30 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-16:14.openssh Security Advisory The FreeBSD Project Topic: OpenSSH xauth(1) command injection Category: contrib Module: OpenSSH Announced: 2016-03-16 Credits: Affects: All supported versions of FreeBSD. Corrected: 2016-03-12 23:53:20 UTC (stable/10, 10.2-STABLE) 2016-03-14 13:05:13 UTC (releng/10.3, 10.3-RC2) 2016-03-16 22:31:04 UTC (releng/10.2, 10.2-RELEASE-p14) 2016-03-16 22:30:56 UTC (releng/10.1, 10.1-RELEASE-p31) 2016-03-13 23:50:19 UTC (stable/9, 9.3-STABLE) 2016-03-16 22:30:03 UTC (releng/9.3, 9.3-RELEASE-p39) CVE Name: CVE-2016-3115 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background OpenSSH is an implementation of the SSH protocol suite, providing an encrypted and authenticated transport for a variety of services, including remote shell access. OpenSSH supports X11 forwarding, allowing X11 applications on the server to connect to the client's display. When an X11 forwarding session is established, the OpenSSH daemon runs the xauth tool with information provided by the client to create an authority file on the server containing information that applications need in order to connect to the client's X11 display. II. Problem Description Due to insufficient input validation in OpenSSH, a client which has permission to establish X11 forwarding sessions to a server can piggyback arbitrary shell commands on the data intended to be passed to the xauth tool. III. Impact An attacker with valid credentials and permission to establish X11 forwarding sessions can bypass other restrictions which may have been placed on their account, for instance using ForceCommand directives in the server's configuration file. IV. Workaround Disable X11 forwarding globally by adding the following line to /etc/ssh/sshd_config, before any Match blocks: X11Forwarding no then either restart the OpenSSH daemon or reboot the system. Consult the sshd(8) and sshd_config(5) manual pages for additional information on how to enable or disable X11 forwarding on a per-user or per-key basis. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date, then either restart the OpenSSH daemon or reboot the system. 2) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install # service sshd restart 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/SA-16:14/openssh-xauth.patch # fetch https://security.FreeBSD.org/patches/SA-16:14/openssh-xauth.patch.asc # gpg --verify openssh-xauth.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in . d) Either restart the OpenSSH daemon or reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/9/ r296780 releng/9.3/ r296953 stable/10/ r296781 releng/10.1/ r296954 releng/10.2/ r296955 releng/10.3/ r296853 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJW6em1AAoJEO1n7NZdz2rnbQEP/2juxLcCzeHBUfVMBF6/HebX Rt72Okdpkeht1FOVAnfJsG1l/zCJhS8RhKVG62KM9nK9Dl83NhLpobVMAhbDtzF/ Sr6f8UYZi22/0OlLsMBrYWeV1C8s6W/5z/d5OeomdHug6g6nFRi2g+tW6NImyU98 YdvgeFLcZKKFy2rbeA1lgXhC7TegKhr3ZbzisEFfkMR+eRYs+3lqaXMAr8RUy3XS RNQBQ5WBfxR1Ld+ISeGjjVYpGU6PG8aY4qFsdGF2yWOBq4hk1NbrPFamVyAVd8g3 PsApqbvIsK8VjPAvxiwxOEfARRxIXsqOu8FcLwkpZ73/pj4vA8DjUSz9knhqhUyF sCaOZxvOSJ5iU4JEB/Lva2jwNiY+6wQa6GXhCTlriV6PZZbhrAl5yzd9Z6jvYHsQ sNx6a9/CjLw1L5Rthe3Ot3lVdnZeKq03tKjV88QFYj8+GhZFTnIjGAkPc+HIONdS SxIhuHTrGGR4bj0XC7EC06ElSlt8oZjTpwKAFRetsJ3Z/DN5P0+HA6GR+5Nk/H2f soP96pmrCNP3DPGNmTuzzGOYR7esTR0tC2d8ebit0kiPwcbQ8x2Bic1hdh2Dc7s8 vDAdxq3nPBHySvCiqt+G1faIA6HfECymhhqhC1bkJe046DQOEAdslhdNUhIBOE/x yFRqqetd9LHhZBI9tGmF =eliH -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Wed Mar 16 23:20:34 2016 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EF3BEAD2EA6 for ; Wed, 16 Mar 2016 23:20:34 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id E6D89E32; Wed, 16 Mar 2016 23:20:34 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1025) id E5C1B1E7A; Wed, 16 Mar 2016 23:20:34 +0000 (UTC) From: FreeBSD Security Advisories To: FreeBSD Security Advisories Reply-To: freebsd-security@freebsd.org Precedence: bulk Message-Id: <20160316232034.E5C1B1E7A@freefall.freebsd.org> Date: Wed, 16 Mar 2016 23:20:34 +0000 (UTC) Subject: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-16:15.sysarch X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.21 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Mar 2016 23:20:35 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-16:15.sysarch Security Advisory The FreeBSD Project Topic: Incorrect argument validation in sysarch(2) Category: core Module: kernel Announced: 2016-03-16 Credits: Core Security Affects: All supported versions of FreeBSD. Corrected: 2016-03-16 22:35:55 UTC (stable/10, 10.2-STABLE) 2016-03-16 22:31:04 UTC (releng/10.2, 10.2-RELEASE-p14) 2016-03-16 22:30:56 UTC (releng/10.1, 10.1-RELEASE-p31) 2016-03-16 22:36:02 UTC (stable/9, 9.3-STABLE) 2016-03-16 22:30:03 UTC (releng/9.3, 9.3-RELEASE-p39) CVE Name: CVE-2016-1885 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background The IA-32 architecture allows programs to define segments, which provides based and size-limited view into the program address space. The memory-resident processor structure, called Local Descriptor Table, usually abbreviated LDT, contains definitions of the segments. Since incorrect or malicious segments would breach system integrity, operating systems do not provide processes direct access to the LDT, instead they provide system calls which allow controlled installation and removal of segments. II. Problem Description A special combination of sysarch(2) arguments, specify a request to uninstall a set of descriptors from the LDT. The start descriptor is cleared and the number of descriptors are provided. Due to invalid use of a signed intermediate value in the bounds checking during argument validity verification, unbound zero'ing of the process LDT and adjacent memory can be initiated from usermode. III. Impact This vulnerability could cause the kernel to panic. In addition it is possible to perform a local Denial of Service against the system by unprivileged processes. IV. Workaround No workaround is available, but only the amd64 architecture is affected. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. Reboot is required. 2) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install Reboot is required. 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/SA-16:15/sysarch.patch # fetch https://security.FreeBSD.org/patches/SA-16:15/sysarch.patch.asc # gpg --verify sysarch.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/9/ r296958 releng/9.3/ r296953 stable/10/ r296957 releng/10.1/ r296954 releng/10.2/ r296955 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJW6eO/AAoJEO1n7NZdz2rn0UMP/iU/orN0P6+Rsj9hY2B6M0VS H6CMMVvketkIIWl9oKX9D/G0g/HyD8uFy06qL2OBz+h99h1oaF5ELl4G6TkF69Ra yOKrLcWnyi3eWLUaPvGkrLakVpG0+pU3QRvBT+d0nsTarOMPq+nhooarMfAluF3p c3bXEjzn/lTA5T0zTcGS2o9IgORvYrKRIGW0KJDsCWsDgVyWngsJAJdIrzwx022Q ENoIGmgLnYsx7TY1cuMtdb3TVyJsZv8zjrrmcLzw67Vly7wShs22CKK23ydDDyy9 xFYsbWA+X8CarV2uSk8xJCIbWjJSlfc9XvOlHLZEiT7PNCZIk2c2fNLENxHvyNl1 vgIUBoD/wzzS5QqdnT4r726aQt3pNezns1NDxujwUovVn5nQaXnKOTJHsOthDJ99 PakEMa93iZqOfzbVouBIBH1IPgNLHof9Jdq3wYiKhrQVJXRespdpCfh3/wdph9LB ElBOTlrCcShV+N6deO4KI2wNK5h704D4hOMsqlInLwGQmGi7qa4ouWASgzQQmU/8 6va3mJsgCvzHUpRCMQo7pIZm6SnOIYLdg7S4vV7P6q5oOIBnjFa8bK/Cq+zOR42e gJs9ou65JTTC0KG+26wXaD2Wx8uriO/+ZfCT/YM29FUUqIdayqHxhACjF0lkY83P 02CAQXURVoI7kbjHaGT7 =jV9z -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Wed Mar 16 23:27:47 2016 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CCA10AD3CC5 for ; Wed, 16 Mar 2016 23:27:47 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id C4B4A29C; Wed, 16 Mar 2016 23:27:47 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1025) id C33C0120C; Wed, 16 Mar 2016 23:27:47 +0000 (UTC) From: FreeBSD Errata Notices To: FreeBSD Errata Notices Reply-To: freebsd-stable@freebsd.org Precedence: bulk Message-Id: <20160316232747.C33C0120C@freefall.freebsd.org> Date: Wed, 16 Mar 2016 23:27:47 +0000 (UTC) Subject: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-16:04.hyperv X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.21 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Mar 2016 23:27:47 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-EN-16:04.hyperv Errata Notice The FreeBSD Project Topic: Hyper-V KVP (Key-Value Pair) daemon indefinite sleep Category: core Module: hyperv Announced: 2016-03-16 Credits: Microsoft Open Source Technology Center(OSTC) Affects: FreeBSD 10.x Corrected: 2015-12-18 14:52:12 UTC (stable/10, 10.2-STABLE) 2016-03-16 22:31:04 UTC (releng/10.2, 10.2-RELEASE-p14) 2016-03-16 22:30:56 UTC (releng/10.1, 10.1-RELEASE-p31) For general information regarding FreeBSD Errata Notices and Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background Hyper-V is a native hypervisor running on Windows operating system. It can run FreeBSD 10.x as guest in virtual machine. Data Exchange is an integration service, also known as a key-value pair or KVP, that can be used to share information between virtual machines and the Hyper-V host. For more information, see . II. Problem Description The KVP driver code doesn't implement the KVP device's .d_poll callback correctly: when there is no data available to the user-mode KVP daemon, the driver forgets to remember the daemon and wake up the daemon later. As a result, the daemon can't be woken up in a predictable period of time, and the host side's KVP query can hang for an unexpected period of time and get timeout, and finally the host can think the VM is irresponsive or unhealthy. III. Impact When a FreeBSD 10.x virtual machine runs on Hyper-V, the host may not get the expected response of a KVP query. When a virtual machine runs on Azure, the host may try to recover the "irresponsive" virtual machine by killing it and starting it later, causing unnecessary virtual machine downtime. IV. Workaround Don't run the KVP daemon on a virtual machine. With this, the host will know that KVP functionality is not working at all, so the host won't try to send KVP query to virtual machine. V. Solution Perform one of the following: 1) Upgrade your system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. Reboot is required. 2) To update your system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install Reboot is required. 3) To update your system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/EN-16:04/hyperv.patch # fetch https://security.FreeBSD.org/patches/EN-16:04/hyperv.patch.asc # gpg --verify hyperv.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/10/ r292438 releng/10.1/ r296954 releng/10.2/ r296955 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References . The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJW6eQmAAoJEO1n7NZdz2rnq+sQAOOnGB826xMwM5xW7a2rnOKV SDPzC0XXkHhRltJWSaIBi+nhKusMQcuYEaZDG8P5pvugpJfBPDhv2THu9ofEhvB4 88iT4sFOKi20iXJxrZQM5UT9tPaDoWUCQ9isr4HseotF5Hda4onplGK3/VXq3xGF tGjgOfnHbhQbXAf7JZwCfjUeIyYYY2VGBscSwDF/AS0Z9vUEudNKnPEZcC5V19LJ 8vZHjknNpchklnaT0UFZwrpFEgpmSU5rtYlH6FbfWYbspqRjEk1Ia2wkasB9im2z v2vc+qNOqgOMATgatix0yqzXnBkOqi+5ra0MUipXG89l3Yxvekv0mvqQFYRWN7MN fjPOnP9i2hjoKbbPEArEmYffOFMjxrOTgzLYVxXntOTUFMgGcUXltgjlo/Ov4Fm0 CfDIDUBlyPlDkemPYiaRinyLim4M3TOll2M6ucnonFuE//sLfU/DEnlz8pf+yJg3 jeJ7Pi6YKe+YUrTj2kL8shoPWjg00oHCIZua9nFhdHwNURX5XuoPlf84qxeSmumL lbQ8Dq82zkECJmJe7fGshUyPGlXqN+ValGYtZkuQwS/vq1cxRomvO1naZQDqJuVA Z15SW63CnsFIYJvK0Dd0v0i3Nw0WYHRRJ5nFo18WIzHs2FZguib1wqiN6D1oRnrH 0YgK0KZFzwWufB7YB0TG =4BjO -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Wed Mar 16 23:27:51 2016 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E1809AD3CDC for ; Wed, 16 Mar 2016 23:27:51 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id C7C6C2B5; Wed, 16 Mar 2016 23:27:51 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1025) id C610D120F; Wed, 16 Mar 2016 23:27:51 +0000 (UTC) From: FreeBSD Errata Notices To: FreeBSD Errata Notices Reply-To: freebsd-stable@freebsd.org Precedence: bulk Message-Id: <20160316232751.C610D120F@freefall.freebsd.org> Date: Wed, 16 Mar 2016 23:27:51 +0000 (UTC) Subject: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-16:05.hv_netvsc X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.21 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Mar 2016 23:27:52 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-EN-16:05.hv_netvsc Errata Notice The FreeBSD Project Topic: hv_netvsc(4) incorrect TCP/IP checksums Category: core Module: hyperv Announced: 2016-03-16 Credits: Larry Baird Affects: FreeBSD 10.2 Corrected: 2015-12-18 14:56:49 UTC (stable/10, 10.2-STABLE) 2016-03-16 22:31:04 UTC (releng/10.2, 10.2-RELEASE-p14) For general information regarding FreeBSD Errata Notices and Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background Hyper-V is a native hypervisor running on Windows operating system. It can run FreeBSD 10.x as guest in virtual machine. When FreeBSD guest runs on Hyper-V, to get the best network performance, it usually uses the Hyper-V synthetic network device. The driver of the network device is called hv_netvsc(4). Since FreeBSD 10.2-RELEASE the driver supports TCP segmentation and TCP/IP checksum offloading. II. Problem Description Together with the TCP segmentation and TCP/IP checksum offloading a regression was introduced. The driver checked the inbound checksum flags when deciding whether to process checksums or not, while it should have checked the outbound flags only. III. Impact If the guest running on Hyper-V is configured as a gateway, the host will silently drop certain packets from the guest. IV. Workaround No workaround is available. V. Solution Perform one of the following: 1) Upgrade your system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. Reboot is required. 2) To update your system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install Reboot is required. 3) To update your system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/EN-16:05/hv_netvsc.patch # fetch https://security.FreeBSD.org/patches/EN-16:05/hv_netvsc.patch.asc # gpg --verify hv_netvsc.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/10/ r292439 releng/10.2/ r296955 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJW6eQyAAoJEO1n7NZdz2rnOdQQANX3NYcoY1uMJEJcOMgfKp52 OUKUriPdJjEr94Yq/QSGaIp5WyZ5O/hu89LI45DlJMHGxQYJrpQuM1Cyf2QS770u yrmfTkcJpqmwJpr4pOqQuYUHuAXkUsOeOysOO/2ccP7USFWqdWbgLotbq3JAFwIz cnPwteAawZ3BZLaDRXgsr9Hhqn5d++YIsYC3mhyGNJJI6LlNG/ihba2Vd8lDu9hv UVv0WW8yfv851jEv/vhCQmhHcHcIAhzZGLn47Shi4s0833icvPeU+Xc/cpL/wifX vCPKA53DqdsNCsPQbbfzgCgoxV1iC3zb/4EOUAIpCInS00N4YQeQiJePH7Im56rc y6LsccIf1otr8xCuRuWsUVXuzrmtDBKDzE2gwMx+YHAEWl7ObhgM1VYYWoYnwBlr g+M2Wynjcj/rSZUpBdtUFFDNhqFlvrFSXDUEl0MbK4IzwtyOQtQfnCjy6kTqr2yB czWonmU9tgLtaqkN61b5pBx+jR2oEC4M8HPHuA2LmEKLJrgfePHBIAZ7cPnWaZ4O L4uP97MPmZEQggQeED5SLTMl3jJUe52H9XDkN8RV8/P3oA/YXBD4prhg4fYvNKQT VR0pWvlnJNmjaupCBWOfJfG1S8+oOfoTNV5/Fq83LVLW0DPKHVmLtQfS5Rs02745 VnvCDT/XPOCODW1KdsSc =vkxR -----END PGP SIGNATURE-----