From owner-svn-doc-all@freebsd.org Sun Oct 30 00:58:45 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DF80DC1DDE5; Sun, 30 Oct 2016 00:58:45 +0000 (UTC) (envelope-from rcyu@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 92C3EB4; Sun, 30 Oct 2016 00:58:45 +0000 (UTC) (envelope-from rcyu@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u9U0wiDt067087; Sun, 30 Oct 2016 00:58:44 GMT (envelope-from rcyu@FreeBSD.org) Received: (from rcyu@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u9U0wirW067086; Sun, 30 Oct 2016 00:58:44 GMT (envelope-from rcyu@FreeBSD.org) Message-Id: <201610300058.u9U0wirW067086@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rcyu set sender to rcyu@FreeBSD.org using -f From: Ruey-Cherng Yu Date: Sun, 30 Oct 2016 00:58:44 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49610 - head/zh_TW.UTF-8/htdocs X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 30 Oct 2016 00:58:46 -0000 Author: rcyu Date: Sun Oct 30 00:58:44 2016 New Revision: 49610 URL: https://svnweb.freebsd.org/changeset/doc/49610 Log: -Add zh_TW to the language selector links -Fix the base directory of the language selector links (English base) Approved by: kevlo(mentor) Modified: head/zh_TW.UTF-8/htdocs/index.xsl Modified: head/zh_TW.UTF-8/htdocs/index.xsl ============================================================================== --- head/zh_TW.UTF-8/htdocs/index.xsl Sat Oct 29 13:49:28 2016 (r49609) +++ head/zh_TW.UTF-8/htdocs/index.xsl Sun Oct 30 00:58:44 2016 (r49610) @@ -121,34 +121,37 @@
From owner-svn-doc-all@freebsd.org Sun Oct 30 01:30:18 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 740F7C24972; Sun, 30 Oct 2016 01:30:18 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 32F6E1000; Sun, 30 Oct 2016 01:30:18 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u9U1UH2q078563; Sun, 30 Oct 2016 01:30:17 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u9U1UH5R078562; Sun, 30 Oct 2016 01:30:17 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201610300130.u9U1UH5R078562@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Sun, 30 Oct 2016 01:30:17 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49611 - head/ja_JP.eucJP/htdocs/security X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 30 Oct 2016 01:30:18 -0000 Author: ryusuke Date: Sun Oct 30 01:30:17 2016 New Revision: 49611 URL: https://svnweb.freebsd.org/changeset/doc/49611 Log: - Merge the following from the English version: r49577 -> r49581 head/ja_JP.eucJP/htdocs/security/security.xml Modified: head/ja_JP.eucJP/htdocs/security/security.xml Modified: head/ja_JP.eucJP/htdocs/security/security.xml ============================================================================== --- head/ja_JP.eucJP/htdocs/security/security.xml Sun Oct 30 00:58:44 2016 (r49610) +++ head/ja_JP.eucJP/htdocs/security/security.xml Sun Oct 30 01:30:17 2016 (r49611) @@ -5,16 +5,16 @@ ]> - + - &title; + &title; - $FreeBSD$ - + $FreeBSD$ + - +

Ϥ

@@ -22,25 +22,29 @@ ȯԤϥڥ졼ƥ󥰥ƥǤ¤ʤΤˤ褦ȾϤƤޤ Υڡˤϡƥ˥ƥȼȯ줿бˡˤĤƽ񤫤Ƥޤ

+

ܼ

+ + + +

ƥȼ˴ؤ

FreeBSD Υ١ƥ˴ؤ륻ƥϡŻҥ᡼ FreeBSD ƥ (Ѹ) 𤷤Ƥ⤤̩׵ᤵˤϡ ƥե - PGP ȤäưŹ沽᡼ + PGP ȤäưŹ沽᡼ ƥե (Ѹ) 𤷤Ƥ ܺ٤ˤĤƤϡƥȼ ڡ -

- -

ܼ

- - + href="reporting.html">ƥȼ ڡ

Ƕ FreeBSD ƥ

@@ -48,6 +52,55 @@

ƥδʰ Υڡ ˤޤ

+ +

FreeBSD ƥ򤹤

+ +

ƥϡʲ FreeBSD + ᡼󥰥ꥹȤ̤Ƹɽޤ

+ +
    +
  • FreeBSD-security-notifications@FreeBSD.org
  • +
  • FreeBSD-security@FreeBSD.org
  • +
  • FreeBSD-announce@FreeBSD.org (: Ƥ + announce-jp@jp.FreeBSD.org ˤޤ)
  • +
+ +

줿ϡFreeBSD + ƥ ڡ

+ +

ϡ FreeBSD ƥե + PGP + ǽ̾졢http://security.FreeBSD.org/ + ֥Ф advisories + patches + ֥ǥ쥯ȥˤϢѥåȤȤ˥֤ޤ

+ +

FreeBSD ƥեϡ + -STABLE ֥ ƥ֥ + Фƥƥ󶡤Ƥޤ + (-CURRENT ֥ Ф봫󶡤ޤ)

+ +
    +
  • -STABLE ֥ˤ + stable/10 Τ褦ʥ̾դƤޤ + б빽ʪ + FreeBSD 10.1-STABLE Τ褦̾ˤʤޤ

  • + +
  • FreeBSD γƥ꡼ˤϡ + б륻ƥ֥ҤȤѰդƤޤ + ƥ֥ˤ + releng/10.1 Τ褦ʥ̾դƤޤ + б빽ʪ + FreeBSD 10.1-RELEASE-p4 Τ褦̾ˤʤޤ

  • +
+ +

Ports Collection ˴ϢϡFreeBSD VuXML + ˤ󶡤ޤ

+

ƥΥåץǡȤˡ

@@ -69,6 +122,8 @@

ݡȤƤ FreeBSD Υ꡼

+

ƥ꡼Ф륻ƥեΥݡȤˤϴ¤ޤ

+

ߥݡȤƤ֥ӳƥ꡼ʬपݼ齪λͽ (Expected EoL) ϡΤȤǤ ݼ齪λͽ ˤϡ @@ -76,17 +131,11 @@ ˤդ路ͳС ͽϱĹǽȤȤˤդ

-

&os; 11.0-RELEASE 顢 ݡȤƤ뤹٤ƤΥ꡼Ф - ®˥ƥåץǡȤ󶡤Ǥ褦ˤǡ - ®ʳȯǽˤʤ褦ˡݡȥǥ뤬ѹˤʤޤ

- -

ݡȥǥǤϡƥ᥸㡼С stable ֥ϡ - Ū 5 ǯ֥ݡȤޤƥݥȥ꡼Υݡȴ֤ϡ - Υݥȥ꡼θ 3 ޤǤȤʤޤ

- -

ѹξܺ٤京ˤĤƤϡ2015 ǯ 2 - ʥ

+

θŤ꡼ˤĤƤϡ + ѶŪ˥ƥʥ󥹤뤳ȤϤޤΤǡ + 嵭ΥݡȤƤ뤤줫Υ꡼ؤΥåץ졼ɤ򶯤侩ޤ + ݡȤλ꡼ Υڡ ˤޤȤƤޤ

- + ru -
  • +
  • zh_CN
  • +
  • + zh_CN +
  • From owner-svn-doc-all@freebsd.org Mon Oct 31 16:46:46 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B1A92C28F3A; Mon, 31 Oct 2016 16:46:46 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 638DB1A84; Mon, 31 Oct 2016 16:46:46 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u9VGkjP5080058; Mon, 31 Oct 2016 16:46:45 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u9VGkjd2080055; Mon, 31 Oct 2016 16:46:45 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201610311646.u9VGkjd2080055@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Mon, 31 Oct 2016 16:46:45 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49618 - in head/en_US.ISO8859-1/htdocs/releases: 10.3R 11.0R 9.3R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 31 Oct 2016 16:46:46 -0000 Author: gjb Date: Mon Oct 31 16:46:45 2016 New Revision: 49618 URL: https://svnweb.freebsd.org/changeset/doc/49618 Log: Regen from r308135. Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html Mon Oct 31 08:55:16 2016 (r49617) +++ head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html Mon Oct 31 16:46:45 2016 (r49618) @@ -1,5 +1,5 @@ -FreeBSD 10.3-RELEASE Errata

    FreeBSD 10.3-RELEASE Errata

    The FreeBSD Project

    FreeBSD 10.3-RELEASE Errata

    The FreeBSD Project

    FreeBSD is a registered trademark of the FreeBSD Foundation.

    Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered @@ -42,7 +42,8 @@ layer

    FreeBSD-SA-16:22.libarchive31May2016

    Absolute path traversal vulnerability

    FreeBSD-SA-16:23.libarchive31May2016

    Absolute path traversal vulnerability

    FreeBSD-SA-16:24.ntp3June2016

    Multiple ntp - vulnerabilties

    FreeBSD-SA-16:25.bspatch25July2016

    heap overflow vulnerability

    3.Errata Notices

    ErrataDateTopic
    FreeBSD-EN-16:06.libc4May2016

    Performance regression in libc + vulnerabilties

    FreeBSD-SA-16:25.bspatch25July2016

    heap overflow vulnerability

    FreeBSD-SA-16:26.openssl23September2016

    Multiple vulnerabilities

    FreeBSD-SA-16:27.openssl26September2016

    Regression in OpenSSL + suite

    FreeBSD-SA-16:29.bspatch10October2016

    Heap overflow vulnerability

    FreeBSD-SA-16:30.portsnap10October2016

    Multiple vulnerabilities

    FreeBSD-SA-16:31.libarchive10October2016

    Multiple vulnerabilities

    3.Errata Notices

    ErrataDateTopic
    FreeBSD-EN-16:06.libc4May2016

    Performance regression in libc hash(3)

    FreeBSD-EN-16:07.ipi4May2016

    Excessive latency in x86 IPI delivery

    FreeBSD-EN-16:08.zfs4May2016

    Memory leak in ZFS

    FreeBSD-EN-16:09.freebsd-update25July2016

    Fix freebsd-update(8) support of FreeBSD11.0-RELEASE

    FreeBSD-EN-16:10.dhclient11August2016

    Better handle unknown options received from @@ -52,7 +53,7 @@ calibration

    FreeBSD-EN-16:14.hv_storvsc11August2016

    Disable incorrect callout in hv_storvsc(4)

    FreeBSD-EN-16:15.vmbus11August2016

    Better handle the GPADL setup failure in Hyper-V

    FreeBSD-EN-16:16.hv_storvsc11August2016

    Fix SCSI INQUIRY checks and error - handling

    4.Open Issues

    • FreeBSD/i386 10.3-RELEASE running as a guest + handling

      FreeBSD-EN-16:17.vm25October2016

      Several virtual memory issues

    4.Open Issues

    • FreeBSD/i386 10.3-RELEASE running as a guest operating system on VirtualBox can have a problem with disk I/O access. It depends on some specific hardware configuration and does not depend on a Modified: head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html Mon Oct 31 08:55:16 2016 (r49617) +++ head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html Mon Oct 31 16:46:45 2016 (r49618) @@ -1,5 +1,5 @@ -FreeBSD 11.0-RELEASE Errata

      FreeBSD 11.0-RELEASE Errata

      The FreeBSD Project

      FreeBSD is a registered trademark of +FreeBSD 11.0-RELEASE Errata

      FreeBSD 11.0-RELEASE Errata

      The FreeBSD Project

      FreeBSD is a registered trademark of the FreeBSD Foundation.

      Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United @@ -36,7 +36,7 @@ which keep up-to-date mirrors of this location.

      Source and binary snapshots of FreeBSD 11.0-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).

      For a list of all FreeBSD CERT security advisories, see - https://www.FreeBSD.org/security/.

      2.Security Advisories

      AdvisoryDateTopic

      No advisories.

      3.Errata Notic es

      ErrataDateTopic

      No errata notices.

      4.Open Issues

      2.Security Advisories

      AdvisoryDateTopic
      FreeBSD-SA-16:32.bhyve25October2016

      Privilege escalation vulnerability

      3.Errata Notices

      ErrataDateTopic
      FreeBSD-EN-16:18.loader25October2016

      Loader may hang during boot

      4.Open Issues

      • An issue was discovered with Amazon EC2™ images which would cause the virtual machine to hang during boot when upgrading from previous FreeBSD versions. New EC2™ installations are not affected, but existing Modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Mon Oct 31 08:55:16 2016 (r49617) +++ head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Mon Oct 31 16:46:45 2016 (r49618) @@ -73,7 +73,9 @@ layer

        FreeBSD-SA-16:22.libarchive31May2016

        Absolute path traversal vulnerability

        FreeBSD-SA-16:23.libarchive31May2016

        Absolute path traversal vulnerability

        FreeBSD-SA-16:24.ntp3June2016

        Multiple ntp - vulnerabilties

        FreeBSD-SA-16:25.bspatch25July2016

        heap overflow vulnerability

      3.Errata Notices

      ErrataDateTopic
      FreeBSD-EN-14:10.tzdata21October2014

      Time zone data file update

      < /td>
      FreeBSD-EN-14:11.crypt21October2014

      Change crypt(3) default hashing algorithm + vulnerabilties

      FreeBSD-SA-16:25.bspatch25July2016

      heap overflow vulnerability

      FreeBSD-SA-16:26.openssl23September2016

      Multiple vulnerabilities

      FreeBSD-SA-16:27.openssl26September2016

      Regression in OpenSSL + suite

      FreeBSD-SA-16:28.bind10October2016

      BIND denial of + service

      FreeBSD-SA-16:29.bspatch10October2016

      Heap overflow vulnerability

      FreeBSD-SA-16:30.portsnap10October2016

      Multiple vulnerabilities

      FreeBSD-SA-16:31.libarchive10October2016

      Multiple vulnerabilities

      3.Errata Notices

      ErrataDateTopic
      FreeBSD-EN-14:10.tzdata21October2014

      Time zone data file update

      FreeBSD-EN-14:11.crypt21October2014

      Change crypt(3) default h! ashing algorithm back to DES

      FreeBSD-EN-14:12.zfs11November2014

      Fix NFSv4 and ZFS cache consistency issue

      FreeBSD-EN-14:13.freebsd-update23December2014

      Fixed directory deletion issue in freebsd-update(8)

      FreeBSD-EN-15:01.vt25February2015

      vt(4) crash with improper ioctl From owner-svn-doc-all@freebsd.org Tue Nov 1 09:04:57 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BD2B1C29AA5; Tue, 1 Nov 2016 09:04:57 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8BF16144B; Tue, 1 Nov 2016 09:04:57 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA194uZX056368; Tue, 1 Nov 2016 09:04:56 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA194uZo056367; Tue, 1 Nov 2016 09:04:56 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201611010904.uA194uZo056367@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Tue, 1 Nov 2016 09:04:56 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49619 - head/ja_JP.eucJP/htdocs X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Nov 2016 09:04:57 -0000 Author: ryusuke Date: Tue Nov 1 09:04:56 2016 New Revision: 49619 URL: https://svnweb.freebsd.org/changeset/doc/49619 Log: Correct translation. Modified: head/ja_JP.eucJP/htdocs/index.xsl Modified: head/ja_JP.eucJP/htdocs/index.xsl ============================================================================== --- head/ja_JP.eucJP/htdocs/index.xsl Mon Oct 31 16:46:45 2016 (r49618) +++ head/ja_JP.eucJP/htdocs/index.xsl Tue Nov 1 09:04:56 2016 (r49619) @@ -157,7 +157,7 @@ zh_CN

    • - zh_CN + zh_TW
    • From owner-svn-doc-all@freebsd.org Tue Nov 1 21:24:16 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1BA21C2A971; Tue, 1 Nov 2016 21:24:16 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 9CD7115C7; Tue, 1 Nov 2016 21:24:15 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA1LOEWV045751; Tue, 1 Nov 2016 21:24:14 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA1LOENZ045750; Tue, 1 Nov 2016 21:24:14 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201611012124.uA1LOENZ045750@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Tue, 1 Nov 2016 21:24:14 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49620 - head/de_DE.ISO8859-1/books/handbook/firewalls X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Nov 2016 21:24:16 -0000 Author: bhd Date: Tue Nov 1 21:24:14 2016 New Revision: 49620 URL: https://svnweb.freebsd.org/changeset/doc/49620 Log: Update to r49600: NTP is UDP port 123. Modified: head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Nov 1 09:04:56 2016 (r49619) +++ head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Nov 1 21:24:14 2016 (r49620) @@ -5,7 +5,7 @@ $FreeBSD$ $FreeBSDde: de-docproj/books/handbook/firewalls/chapter.xml,v 1.53 2012/04/30 16:15:52 bcr Exp $ - basiert auf: r48265 + basiert auf: r49600 --> Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E3101C2A481; Wed, 2 Nov 2016 01:34:59 +0000 (UTC) (envelope-from gavin@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8CAFD1EAE; Wed, 2 Nov 2016 01:34:59 +0000 (UTC) (envelope-from gavin@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA21YwJd041033; Wed, 2 Nov 2016 01:34:58 GMT (envelope-from gavin@FreeBSD.org) Received: (from gavin@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA21YwTb041032; Wed, 2 Nov 2016 01:34:58 GMT (envelope-from gavin@FreeBSD.org) Message-Id: <201611020134.uA21YwTb041032@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gavin set sender to gavin@FreeBSD.org using -f From: Gavin Atkinson Date: Wed, 2 Nov 2016 01:34:58 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49621 - head/en_US.ISO8859-1/htdocs/news/status X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 01:35:00 -0000 Author: gavin Date: Wed Nov 2 01:34:58 2016 New Revision: 49621 URL: https://svnweb.freebsd.org/changeset/doc/49621 Log: Review quarterly status report, fix misspellings, tweak grammar, correct bad capitalisation, and use https:// URLs where possible for FreeBSD resources. Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Tue Nov 1 21:24:14 2016 (r49620) +++ head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Wed Nov 2 01:34:58 2016 (r49621) @@ -110,13 +110,13 @@
      • &os; as the host OS
      • -
      • bhyve
      • +
      • bhyve
      • xen
      • -
      • vale
      • +
      • vale
      • -
      • jail
      • +
      • jail
      • CBSD (as a management tool)
      • @@ -187,7 +187,7 @@ - Google Inc. + Google Inc @@ -545,8 +545,8 @@
      • x11-clocks/xfce4-datetime-plugin (0.6.99)
      -

      Currently, the unstable releases work fine with our Gtk3 - ports available in the ports tree, but in the future, support +

      Currently the unstable releases work fine with our Gtk3 + ports available in the ports tree, but in the future support for 3.18 will be removed in preference of 3.20.x.

      @@ -662,7 +662,7 @@ - iXsystems, Inc. + iXsystems, Inc @@ -957,7 +957,7 @@ - The igor Port. + The igor Port. BSD Family Tree in Subversion The UNIX Heritage Society Cat-V Manual Library @@ -1418,7 +1418,7 @@ mtx_trylock_spin(9) was implemented and is used for this purpose.

      -

      The userspace getttimeofday(2) implementation was +

      The userspace gettimeofday(2) implementation was enhanced to allow syscall-less operation on machines that use HPET hardwire for timecounters. The HPET algorithm coexists with older RDTSC-based code, allowing dynamic switching of @@ -1429,7 +1429,7 @@ but, not unexpectedly, even the syscall-less HPET timecounter is slower than invoking a syscall for RDTSC.

      -

      Some not strictly interwined but related code is the +

      Some not strictly intertwined but related code is the time-bound sleep implementation. Handling of races between callouts and the top-half code that sets and processes the timeouts depended on the many fine details of the @@ -1610,13 +1610,13 @@ GitHub Repository - Graphics Stack Roadmap and Supported Hardware Matrix + Graphics Stack Roadmap and Supported Hardware Matrix Ports Development Repository DRM 4.7 Development Repository - GSoC 2016: Link /dev Entries to Sysctl Nodes + GSoC 2016: Link /dev Entries to Sysctl Nodes GSoC 2016: Redesign libdevq Wayland Notes - Graphics Team Blog + Graphics Team Blog @@ -1724,7 +1724,7 @@

    • Provided kernel support for EFI Runtime Services calls
    • -
    • Implemented getttimeofday(2) purely in userspace +
    • Implemented gettimeofday(2) purely in userspace for HPET timers
    • Implemented fdatasync(2)
    • @@ -1889,13 +1889,13 @@ 22-25, 2016, Belgrade, Serbia (Silver Sponsor) (https://2016.eurobsdcon.org/)

      -

      Our EuroBSDCon involvement included:

      +

      Our EuroBSDcon involvement included:

      • Held a Women in Tech BoF in partnership with ACM-W Europe
      • -
      • Bennedict organized the EuroBSDCon Developer +
      • Bennedict organized the EuroBSDcon Developer Summit
      • Deb gave a Foundation Update talk and Hiroki Sato and @@ -1929,7 +1929,7 @@

      We sponsored three &os; contributors to attend - EuroBSDCon.

      + EuroBSDcon.

      Legal/&os; IP

      @@ -2119,12 +2119,12 @@ Ed Maste - emaste@freebsd.org + emaste@FreeBSD.org - LLD Wiki Page + LLD Wiki Page @@ -2246,7 +2246,7 @@ machines, supervised the package builds for 11.0-RELEASE, and added support for building arm64 packages.

      -

      At EuroBSDCon, rene visited a presentation by Landry Breuil +

      At EuroBSDcon, rene visited a presentation by Landry Breuil <landry@openbsd.org> explaining how packages are built in the OpenBSD world and explaining various design decisions.

      From owner-svn-doc-all@freebsd.org Wed Nov 2 07:39:01 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 150D6C2A46E; Wed, 2 Nov 2016 07:39:01 +0000 (UTC) (envelope-from delphij@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BCA0611C5; Wed, 2 Nov 2016 07:39:00 +0000 (UTC) (envelope-from delphij@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA27cxTe082315; Wed, 2 Nov 2016 07:38:59 GMT (envelope-from delphij@FreeBSD.org) Received: (from delphij@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA27cxgo082314; Wed, 2 Nov 2016 07:38:59 GMT (envelope-from delphij@FreeBSD.org) Message-Id: <201611020738.uA27cxgo082314@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: delphij set sender to delphij@FreeBSD.org using -f From: Xin LI Date: Wed, 2 Nov 2016 07:38:59 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49622 - head/share/xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 07:39:01 -0000 Author: delphij Date: Wed Nov 2 07:38:59 2016 New Revision: 49622 URL: https://svnweb.freebsd.org/changeset/doc/49622 Log: Use stylesheet for prints as well. Modified: head/share/xml/xhtml.xsl Modified: head/share/xml/xhtml.xsl ============================================================================== --- head/share/xml/xhtml.xsl Wed Nov 2 01:34:58 2016 (r49621) +++ head/share/xml/xhtml.xsl Wed Nov 2 07:38:59 2016 (r49622) @@ -42,7 +42,7 @@ - + &header1.googlejs; From owner-svn-doc-all@freebsd.org Wed Nov 2 07:45:13 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4A59CC2A671; Wed, 2 Nov 2016 07:45:13 +0000 (UTC) (envelope-from delphij@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 14A631D59; Wed, 2 Nov 2016 07:45:13 +0000 (UTC) (envelope-from delphij@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA27jCeJ086135; Wed, 2 Nov 2016 07:45:12 GMT (envelope-from delphij@FreeBSD.org) Received: (from delphij@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA27jBZ2086123; Wed, 2 Nov 2016 07:45:11 GMT (envelope-from delphij@FreeBSD.org) Message-Id: <201611020745.uA27jBZ2086123@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: delphij set sender to delphij@FreeBSD.org using -f From: Xin LI Date: Wed, 2 Nov 2016 07:45:11 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49623 - in head/share: security/advisories security/patches/SA-16:33 security/patches/SA-16:34 security/patches/SA-16:35 xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 07:45:13 -0000 Author: delphij Date: Wed Nov 2 07:45:10 2016 New Revision: 49623 URL: https://svnweb.freebsd.org/changeset/doc/49623 Log: Add SA-16:33, SA-16:34 and SA-16:35. Added: head/share/security/advisories/FreeBSD-SA-16:33.openssh.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-16:34.bind.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-16:35.openssl.asc (contents, props changed) head/share/security/patches/SA-16:33/ head/share/security/patches/SA-16:33/openssh.patch (contents, props changed) head/share/security/patches/SA-16:33/openssh.patch.asc (contents, props changed) head/share/security/patches/SA-16:34/ head/share/security/patches/SA-16:34/bind.patch (contents, props changed) head/share/security/patches/SA-16:34/bind.patch.asc (contents, props changed) head/share/security/patches/SA-16:35/ head/share/security/patches/SA-16:35/openssl-10.patch (contents, props changed) head/share/security/patches/SA-16:35/openssl-10.patch.asc (contents, props changed) head/share/security/patches/SA-16:35/openssl-9.patch (contents, props changed) head/share/security/patches/SA-16:35/openssl-9.patch.asc (contents, props changed) Modified: head/share/xml/advisories.xml Added: head/share/security/advisories/FreeBSD-SA-16:33.openssh.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-16:33.openssh.asc Wed Nov 2 07:45:10 2016 (r49623) @@ -0,0 +1,143 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-16:33.openssh Security Advisory + The FreeBSD Project + +Topic: OpenSSH Remote Denial of Service vulnerability + +Category: contrib +Module: OpenSSH +Announced: 2016-11-02 +Affects: All supported versions of FreeBSD. +Corrected: 2016-11-02 06:56:35 UTC (stable/11, 11.0-STABLE) + 2016-11-02 07:23:19 UTC (releng/11.0, 11.0-RELEASE-p3) + 2016-11-02 06:58:47 UTC (stable/10, 10.3-STABLE) + 2016-11-02 07:23:36 UTC (releng/10.3, 10.3-RELEASE-p12) +CVE Name: CVE-2016-8858 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +OpenSSH is an implementation of the SSH protocol suite, providing an +encrypted and authenticated transport for a variety of services, +including remote shell access. + +During the SSH handshake procedure, the client and server exchanges the +supported encryption, MAC and compression algorithms along with other +information to negotiate algorithms for initial key exchange, with a +message named SSH_MSG_KEXINIT. + +II. Problem Description + +When processing the SSH_MSG_KEXINIT message, the server could allocate +up to a few hundreds of megabytes of memory per each connection, before +any authentication take place. + +III. Impact + +A remote attacker may be able to cause a SSH server to allocate an excessive +amount of memory. Note that the default MaxStartups setting on FreeBSD will +limit the effectiveness of this attack. + +IV. Workaround + +No workaround is available, but systems where sshd(8) is not used are +not vulnerable. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +The sshd(8) service has to be restarted after the update. A reboot +is recommended but not required. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +The sshd(8) service has to be restarted after the update. A reboot +is recommended but not required. + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-16:33/openssh.patch +# fetch https://security.FreeBSD.org/patches/SA-16:33/openssh.patch.asc +# gpg --verify openssh.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +The sshd(8) service has to be restarted after the update. A reboot +is recommended but not required. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/10/ r308199 +releng/10.3/ r308203 +stable/11/ r308198 +releng/11.0/ r308202 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.15 (FreeBSD) + +iQIcBAEBCgAGBQJYGZhkAAoJEO1n7NZdz2rnws4P/0i2V2lw3snDi4oVsX2AVkl+ +bQ9iRUvgO0SSB4b8JZ8dK6wws8InDR8oihm8jBsaOYPOxu7Wz9Zua2ZAjBAY/GLB +o2+2UMGKVNlP59D/pwBD3qWEjG2KYpE5hItX7iykjwDvd8c7UOLZt7oofVfq8R7D +84BkMQb9DM/1PwFI+ztMYN3uAlzsNxi0GqoHe7PBYmA5rq3QF9LoUlRyOW9KQq8Q +TsBg8briGhy44XifhxU7eUsPUrxJLb5c/w3xsuzSw1AFpgSAc8IKAcrknnTdy+0c +k5GfJz/84xcN1/HO6FDVtYgIoOK2C/ljCHiRAPRsVK3TvXl6agErVBf3CTvWKjg9 +NY6QD0KTJw5QF0LT6GbLRAdwnAexQI0U7Hw3Xylv2CFnaxsdYeB9YTVqqMricUqQ +7GZ/ktiXJwBpDLkaieeI6WhbAVdsNQc5A1UWQwjv6mFr5TKhOFWvmHRo/KZprWqd +vFqYNHc3NngcKs537WOXchNnW46hWMsiis/1mJfiRZd89rzq5Dtz7tCcX1c7RgRW +4h0vhtqRMQraby0fI0ND3kC7EnXchMqWAoQ3Tric+2yWQMW/OGDvWXWbM0HqUKq7 +7fOGMmXmLhQnkykf4uwjrP4cyMSzSbGdrLQxpwWPwZoH47es/qYKHukBRcnmEkA+ +VpT6Vpm0Lqi80W5bh783 +=xyal +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-16:34.bind.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-16:34.bind.asc Wed Nov 2 07:45:10 2016 (r49623) @@ -0,0 +1,137 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-16:34.bind Security Advisory + The FreeBSD Project + +Topic: BIND Remote Denial of Service vulnerability + +Category: contrib +Module: bind +Announced: 2016-11-02 +Credits: ISC +Affects: FreeBSD 9.x +Corrected: 2016-11-02 05:13:27 UTC (stable/9, 9.3-STABLE) + 2016-11-02 07:24:34 UTC (releng/9.3, 9.3-RELEASE-p50) +CVE Name: CVE-2016-8864 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +BIND 9 is an implementation of the Domain Name System (DNS) protocols. +The named(8) daemon is an Internet Domain Name Server. + +II. Problem Description + +A defect in BIND's handling of responses containing a DNAME answer could +cause a resolver to exit after encountering an assertion failure in +db.c or resolver.c. + +During processing of a recursive response that contains a DNAME record +in the answer section, BIND could stop executing after encountering an +assertion error in resolver.c. + +III. Impact + +A remote attacker who could cause a server to make a query deliberately +chosen to trigger the failed assertions could cause named(8) to stop, +resulting in a Denial of Service condition to its clients. + +IV. Workaround + +No workaround is available, but hosts not running named(8) recursive +servers are not affected. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +The named service has to be restarted after the update. A reboot is +recommended but not required. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +The named service has to be restarted after the update. A reboot is +recommended but not required. + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-16:34/bind.patch +# fetch https://security.FreeBSD.org/patches/SA-16:34/bind.patch.asc +# gpg --verify bind.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart the named service, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/9/ r308193 +releng/9.3/ r308205 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.15 (FreeBSD) + +iQIcBAEBCgAGBQJYGZhkAAoJEO1n7NZdz2rn14UQAOI+3haO5nI3D4wPP9EavF9j +SU1yuv2ZrWaldbdv9lSHWsK5gjOjZAwK4TmZSnhe3yC3nNOJimiD5KAjHhCiQEMN +xZ4L0Xtyhp6Bef7pEPdn1KgJCdufRaXt8QYx+YWz2Zk2lV78J9IRUuWNYzTleetM +yNkPIfkGbIEyzMG11nZKzIQ+rjxNS+/KXJTBD4z4xpyjCwnulHuCTGNNPIGSPbbO +1rwY6NifZXRP6yCWmrQWZPV3I7eAjwtWpmU18kLf6dRbRAWa/M9f+ZCW4vR1bBoR +CAX07D0VDPaUM56XCUaspKSvJ3dpJC9GjuEZVXfBoJzbfixeMqYkjgwaPGT+BxLo +AxJv8PVXZiigq+0pXMGjaHdrwWW8UxkthyifGJFSffZMs4eECrIUhFe/SlMQ/5Zm +WZhA28S4QqlcTpObnWVet3C9QdpBtjlodfZqmovHHWZGGcIVPbW+sVaJ3WF2ni6H +OQuJucIVfKQVuv88aSRVlrtGY/KN9wjyUf4zIpyUgPL+qy3vxz2NB41mjM12ZyAi +35KIv3tR5lZIq4C062qR0zlHKldQgxaQPX4rWq7lhQkk2X8B3SjypSMBRfrAosoW +p/xQGqVwX05M7F8ykcdf8vfu3iipz/JDQgSdy3aeziwO5+2xGUt5cdXWpR0gxK4M +2ajEFjl+rHAfYpDkfoGP +=F1Vx +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-16:35.openssl.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-16:35.openssl.asc Wed Nov 2 07:45:10 2016 (r49623) @@ -0,0 +1,148 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-16:35.openssl Security Advisory + The FreeBSD Project + +Topic: OpenSSL Remote DoS vulnerability + +Category: contrib +Module: openssl +Announced: 2016-11-02 +Affects: FreeBSD 9.x and FreeBSD 10.x. +Corrected: 2016-11-02 07:09:31 UTC (stable/10, 10.3-STABLE) + 2016-11-02 07:23:36 UTC (releng/10.3, 10.3-RELEASE-p12) + 2016-11-02 07:24:14 UTC (releng/10.2, 10.2-RELEASE-p25) + 2016-11-02 07:24:14 UTC (releng/10.1, 10.1-RELEASE-p42) + 2016-11-02 07:09:31 UTC (stable/9, 9.3-STABLE) + 2016-11-02 07:24:34 UTC (releng/9.3, 9.3-RELEASE-p50) +CVE Name: CVE-2016-8610 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is +a collaborative effort to develop a robust, commercial-grade, full-featured +Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) +and Transport Layer Security (TLS v1) protocols as well as a full-strength +general purpose cryptography library. + +The SSL alert protocol is a way to communicate problems within a SSL/TLS session. + +II. Problem Description + +Due to improper handling of alert packets, OpenSSL would consume an excessive +amount of CPU time processing undefined alert messages. + +III. Impact + +A remote attacker who can initiate handshakes with an OpenSSL based server +can cause the server to consume a lot of computation power with very little +bandwidth usage, and may be able to use this technique in a leveraged Denial +of Service attack. + +IV. Workaround + +No workaround is available. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Restart all daemons that use the library, or reboot the system. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +Restart all daemons that use the library, or reboot the system. + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 10.x] +# fetch https://security.FreeBSD.org/patches/SA-16:35/openssl-10.patch +# fetch https://security.FreeBSD.org/patches/SA-16:35/openssl-10.patch.asc +# gpg --verify openssl-10.patch.asc + +[FreeBSD 9.3] +# fetch https://security.FreeBSD.org/patches/SA-16:35/openssl-9.patch +# fetch https://security.FreeBSD.org/patches/SA-16:35/openssl-9.patch.asc +# gpg --verify openssl-9.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart all daemons that use the library, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/9/ r308200 +releng/9.3/ r308205 +stable/10/ r308200 +releng/10.1/ r308204 +releng/10.2/ r308204 +releng/10.3/ r308203 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.15 (FreeBSD) + +iQIcBAEBCgAGBQJYGZhkAAoJEO1n7NZdz2rnwbMQAOiGWegkYQodqBzNboK9U+6M +8Jt6HNrYDWAyzp+mZmWxgPWZMkGaNAsBEFXwZlHgs65RCbRczxr/kUWZx2/XHbM3 +kGx5eNIq46BFIrTDPvUgNciorl/ncJGeO4SYEFBYImceDNwIQVtpfz1IUAve+LNW +RYYICakWn8HPuqzmIFjQydMkoyEaHMwsmkv3nVNVX46sVIQ1umZ3RZsKtlPOQqNs +sAa0HuOOQbeU2eJhhtcYcDEPNF7Do9WvSMnYrJQ/lE2SuatXq2tdbvZLV8ieiPoj +3AMf9p2yPpeqqO9yy19CayTSPmDiKMVQq8jikVomX5XkVqNKLrQoQfrvpwR0DWOW +fwIDjZ1H9IXoqjVVZwp5GLfHhAURNjbsszF4B1lXQHI1D/p4bXyOOrcuM1JxHXRK +UGvagbs30DWH+4Baph/UVOsFUhPU0sguPtpPa0XFxSIxB6qZJJGjdOh7el6aBYJu +VxQuw1wWQvJPm9CsIIZrX4WYBcwS8ro82wsfNWO+ZC0j5UbMwh2joFgrbEdWNM3f +MWVYuH5czzoJO85Nu7uGB+qa9GYqKkdwGRDnFshnvPhHHnpmGL/tLHM+Kqg7uDeu +8RsNaZ4PYChZh8YHVooOraDl0Nz0Ln/kok8GdsZUpNfuiXm3U9fLUCAFAdNUOlr6 +PJuvkUEQRMlhG8tX3+11 +=1gO7 +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-16:33/openssh.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:33/openssh.patch Wed Nov 2 07:45:10 2016 (r49623) @@ -0,0 +1,10 @@ +--- crypto/openssh/kex.c.orig ++++ crypto/openssh/kex.c +@@ -468,6 +468,7 @@ + if (kex == NULL) + return SSH_ERR_INVALID_ARGUMENT; + ++ ssh_dispatch_set(ssh, SSH2_MSG_KEXINIT, NULL); + ptr = sshpkt_ptr(ssh, &dlen); + if ((r = sshbuf_put(kex->peer, ptr, dlen)) != 0) + return r; Added: head/share/security/patches/SA-16:33/openssh.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:33/openssh.patch.asc Wed Nov 2 07:45:10 2016 (r49623) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.15 (FreeBSD) + +iQIcBAABCgAGBQJYGZiEAAoJEO1n7NZdz2rn+gwP/iKpzCRr46PX5c9XHHy5NGlY +unel+99VsL2KH5mfAfFVRU67FS2AtTWOpSi5CuWMimc0a97mszkbeqzbtO5dcppA +0i71XkzB9nmRLgXKYMt7H7KVmUd4DIXuztvX/sQxbwX5yonRzeqqo1R7Pq55wz6/ +OO//BKLxKUiwDOKHUhhAZkaXEBt39c1EB0bRBpNeqsfsdD9IWm82Wh69jWrkOWeO +6q+lRAtGoAl5vCO85XHYor4Pd7V2uSvLK4DRJyGFps8oc5vr6ZRmRvDTlF6VGBV4 +P/3xPDe1euVDBUZMAnlJVLvkiI2FeEc4lbXAtgirYfKE97XpEkXoEwSc2ExGKte9 +6e3xdmGei4HVb7FQPfrFb4wD/wGXbqp9XKLE/ECYKZM76Hltz1ac7ziihYYJSLyS +/kzS4TBidIHiAiZDYGrREx28LPYtm5w84jBmngdg8BGAPzZNPtXM9phmXaBWeU/c +PcLsjGQUi436R/NYzZ0Z8qM/SDbeghSIvSO+FmaoUHs7T8Bkk1xVU8TQhiv4uYW9 +j94qfOZ8oDbwbq16F2xsfvXLj2b+nnMgcICEiDeoA7aifrmHQCmx3y4VdGPH0/oD +lw9wjSA3vfLgCh9UFb1BkxMcJpYkdTSDOb8cvR+ukIq4jIdJgnucQMd1KItZeaSQ +q09FlZaUT20jY+bZZ2r0 +=qiKR +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-16:34/bind.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:34/bind.patch Wed Nov 2 07:45:10 2016 (r49623) @@ -0,0 +1,184 @@ +--- contrib/bind9/lib/dns/resolver.c.orig ++++ contrib/bind9/lib/dns/resolver.c +@@ -524,7 +524,9 @@ + valarg->addrinfo = addrinfo; + + if (!ISC_LIST_EMPTY(fctx->validators)) +- INSIST((valoptions & DNS_VALIDATOR_DEFER) != 0); ++ valoptions |= DNS_VALIDATOR_DEFER; ++ else ++ valoptions &= ~DNS_VALIDATOR_DEFER; + + result = dns_validator_create(fctx->res->view, name, type, rdataset, + sigrdataset, fctx->rmessage, +@@ -4849,13 +4851,6 @@ + rdataset, + sigrdataset, + valoptions, task); +- /* +- * Defer any further validations. +- * This prevents multiple validators +- * from manipulating fctx->rmessage +- * simultaneously. +- */ +- valoptions |= DNS_VALIDATOR_DEFER; + } + } else if (CHAINING(rdataset)) { + if (rdataset->type == dns_rdatatype_cname) +@@ -4961,6 +4956,11 @@ + eresult == DNS_R_NCACHENXRRSET); + } + event->result = eresult; ++ if (adbp != NULL && *adbp != NULL) { ++ if (anodep != NULL && *anodep != NULL) ++ dns_db_detachnode(*adbp, anodep); ++ dns_db_detach(adbp); ++ } + dns_db_attach(fctx->cache, adbp); + dns_db_transfernode(fctx->cache, &node, anodep); + clone_results(fctx); +@@ -5208,6 +5208,11 @@ + fctx->attributes |= FCTX_ATTR_HAVEANSWER; + if (event != NULL) { + event->result = eresult; ++ if (adbp != NULL && *adbp != NULL) { ++ if (anodep != NULL && *anodep != NULL) ++ dns_db_detachnode(*adbp, anodep); ++ dns_db_detach(adbp); ++ } + dns_db_attach(fctx->cache, adbp); + dns_db_transfernode(fctx->cache, &node, anodep); + clone_results(fctx); +@@ -6016,13 +6021,15 @@ + answer_response(fetchctx_t *fctx) { + isc_result_t result; + dns_message_t *message; +- dns_name_t *name, *dname = NULL, *qname, tname, *ns_name; ++ dns_name_t *name, *dname = NULL, *qname, *dqname, tname, *ns_name; ++ dns_name_t *cname = NULL; + dns_rdataset_t *rdataset, *ns_rdataset; + isc_boolean_t done, external, chaining, aa, found, want_chaining; +- isc_boolean_t have_answer, found_cname, found_type, wanted_chaining; ++ isc_boolean_t have_answer, found_cname, found_dname, found_type; ++ isc_boolean_t wanted_chaining; + unsigned int aflag; + dns_rdatatype_t type; +- dns_fixedname_t fdname, fqname; ++ dns_fixedname_t fdname, fqname, fqdname; + dns_view_t *view; + + FCTXTRACE("answer_response"); +@@ -6036,6 +6043,7 @@ + + done = ISC_FALSE; + found_cname = ISC_FALSE; ++ found_dname = ISC_FALSE; + found_type = ISC_FALSE; + chaining = ISC_FALSE; + have_answer = ISC_FALSE; +@@ -6045,12 +6053,13 @@ + aa = ISC_TRUE; + else + aa = ISC_FALSE; +- qname = &fctx->name; ++ dqname = qname = &fctx->name; + type = fctx->type; + view = fctx->res->view; ++ dns_fixedname_init(&fqdname); + result = dns_message_firstname(message, DNS_SECTION_ANSWER); + while (!done && result == ISC_R_SUCCESS) { +- dns_namereln_t namereln; ++ dns_namereln_t namereln, dnamereln; + int order; + unsigned int nlabels; + +@@ -6058,6 +6067,8 @@ + dns_message_currentname(message, DNS_SECTION_ANSWER, &name); + external = ISC_TF(!dns_name_issubdomain(name, &fctx->domain)); + namereln = dns_name_fullcompare(qname, name, &order, &nlabels); ++ dnamereln = dns_name_fullcompare(dqname, name, &order, ++ &nlabels); + if (namereln == dns_namereln_equal) { + wanted_chaining = ISC_FALSE; + for (rdataset = ISC_LIST_HEAD(name->list); +@@ -6152,7 +6163,7 @@ + } + } else if (rdataset->type == dns_rdatatype_rrsig + && rdataset->covers == +- dns_rdatatype_cname ++ dns_rdatatype_cname + && !found_type) { + /* + * We're looking for something else, +@@ -6182,11 +6193,18 @@ + * a CNAME or DNAME). + */ + INSIST(!external); +- if (aflag == +- DNS_RDATASETATTR_ANSWER) { ++ if ((rdataset->type != ++ dns_rdatatype_cname) || ++ !found_dname || ++ (aflag == ++ DNS_RDATASETATTR_ANSWER)) ++ { + have_answer = ISC_TRUE; ++ if (rdataset->type == ++ dns_rdatatype_cname) ++ cname = name; + name->attributes |= +- DNS_NAMEATTR_ANSWER; ++ DNS_NAMEATTR_ANSWER; + } + rdataset->attributes |= aflag; + if (aa) +@@ -6280,11 +6298,11 @@ + return (DNS_R_FORMERR); + } + +- if (namereln != dns_namereln_subdomain) { ++ if (dnamereln != dns_namereln_subdomain) { + char qbuf[DNS_NAME_FORMATSIZE]; + char obuf[DNS_NAME_FORMATSIZE]; + +- dns_name_format(qname, qbuf, ++ dns_name_format(dqname, qbuf, + sizeof(qbuf)); + dns_name_format(name, obuf, + sizeof(obuf)); +@@ -6299,7 +6317,7 @@ + want_chaining = ISC_TRUE; + POST(want_chaining); + aflag = DNS_RDATASETATTR_ANSWER; +- result = dname_target(rdataset, qname, ++ result = dname_target(rdataset, dqname, + nlabels, &fdname); + if (result == ISC_R_NOSPACE) { + /* +@@ -6316,10 +6334,13 @@ + + dname = dns_fixedname_name(&fdname); + if (!is_answertarget_allowed(view, +- qname, rdataset->type, +- dname, &fctx->domain)) { ++ dqname, rdataset->type, ++ dname, &fctx->domain)) ++ { + return (DNS_R_SERVFAIL); + } ++ dqname = dns_fixedname_name(&fqdname); ++ dns_name_copy(dname, dqname, NULL); + } else { + /* + * We've found a signature that +@@ -6344,6 +6365,10 @@ + INSIST(!external); + if (aflag == DNS_RDATASETATTR_ANSWER) { + have_answer = ISC_TRUE; ++ found_dname = ISC_TRUE; ++ if (cname != NULL) ++ cname->attributes &= ++ ~DNS_NAMEATTR_ANSWER; + name->attributes |= + DNS_NAMEATTR_ANSWER; + } Added: head/share/security/patches/SA-16:34/bind.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:34/bind.patch.asc Wed Nov 2 07:45:10 2016 (r49623) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.15 (FreeBSD) + +iQIcBAABCgAGBQJYGZiEAAoJEO1n7NZdz2rnuoAP/2ghYzKyVElGqCJqNSvj9tLV +CAC6SdIdw9SaLyvPc33O6Sx0hpUlUkJxs9DDAA34OcdkiT0MiB2G2QvIFqUaF2p/ +CTPtKCYQ3dmPXdedm/JX5mkz1BJUWl5vHha2Kzmrv2H5VYAti58RGcQASlIIlbl+ +OKIkME+kD1wABPuY3HD4BofT7yt6vezwhvxdSaZDnqEMp2owed8PKNZBRxl4tYX/ +ABioDFCxqs2OwDLU8HYoFcIlXkCin5WgIqGnXtBLIYE/W6E2hFCO4K94QQjRrfoJ +qxYzsIBEVkDsTu1TLvPsINp2PY3Hz93yVSNWAz39z+3R5MzQFhsREfrX6/EJPOi6 +Z8o3oLGZKMsgZ9SPw1gElcvo6Rq9ZfGLsw0GsMWrLOhXtIAfNoL9gVeFPh2rw7lr +qtlOPgnnpXEfOanAQhUfQtp5BuNvcIrfvtMkxqL4BPDT6aeoI+NS1VstZQjnBZR4 +Flgd1ykQbV1ZoCOeJVJaeFiLmMZ0BKz4T0KVrRmBijrVoDzJid11SgDW4N40qSGp +VwQit82ooPzj/YnOp/hDZ19fKY8wA1CUFafjvauqtZwcuc8bDX+AQNZST/we1iki +bEZfH0fDUimKCxkzK1JfnJNG412/m2eZc43aPcXDvH9LjGFbTZw2axTXXgicf2Lo +6A0HJlZU8SV/Y0M/mtlB +=BP8h +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-16:35/openssl-10.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:35/openssl-10.patch Wed Nov 2 07:45:10 2016 (r49623) @@ -0,0 +1,94 @@ +--- crypto/openssl/ssl/d1_pkt.c.orig ++++ crypto/openssl/ssl/d1_pkt.c +@@ -924,6 +924,13 @@ + goto start; + } + ++ /* ++ * Reset the count of consecutive warning alerts if we've got a non-empty ++ * record that isn't an alert. ++ */ ++ if (rr->type != SSL3_RT_ALERT && rr->length != 0) ++ s->s3->alert_count = 0; ++ + /* we now have a packet which can be read and processed */ + + if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec, +@@ -1190,6 +1197,14 @@ + + if (alert_level == SSL3_AL_WARNING) { + s->s3->warn_alert = alert_descr; ++ ++ s->s3->alert_count++; ++ if (s->s3->alert_count == MAX_WARN_ALERT_COUNT) { ++ al = SSL_AD_UNEXPECTED_MESSAGE; ++ SSLerr(SSL_F_DTLS1_READ_BYTES, SSL_R_TOO_MANY_WARN_ALERTS); ++ goto f_err; ++ } ++ + if (alert_descr == SSL_AD_CLOSE_NOTIFY) { + #ifndef OPENSSL_NO_SCTP + /* +--- crypto/openssl/ssl/s3_pkt.c.orig ++++ crypto/openssl/ssl/s3_pkt.c +@@ -1057,6 +1057,13 @@ + return (ret); + } + ++ /* ++ * Reset the count of consecutive warning alerts if we've got a non-empty ++ * record that isn't an alert. ++ */ ++ if (rr->type != SSL3_RT_ALERT && rr->length != 0) ++ s->s3->alert_count = 0; ++ + /* we now have a packet which can be read and processed */ + + if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec, +@@ -1271,6 +1278,14 @@ + + if (alert_level == SSL3_AL_WARNING) { + s->s3->warn_alert = alert_descr; ++ ++ s->s3->alert_count++; ++ if (s->s3->alert_count == MAX_WARN_ALERT_COUNT) { ++ al = SSL_AD_UNEXPECTED_MESSAGE; ++ SSLerr(SSL_F_SSL3_READ_BYTES, SSL_R_TOO_MANY_WARN_ALERTS); ++ goto f_err; ++ } ++ + if (alert_descr == SSL_AD_CLOSE_NOTIFY) { + s->shutdown |= SSL_RECEIVED_SHUTDOWN; + return (0); +--- crypto/openssl/ssl/ssl.h.orig ++++ crypto/openssl/ssl/ssl.h +@@ -2717,6 +2717,7 @@ + # define SSL_R_TLS_HEARTBEAT_PENDING 366 + # define SSL_R_TLS_ILLEGAL_EXPORTER_LABEL 367 + # define SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST 157 ++# define SSL_R_TOO_MANY_WARN_ALERTS 409 + # define SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST 233 + # define SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG 234 + # define SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER 235 +--- crypto/openssl/ssl/ssl3.h.orig ++++ crypto/openssl/ssl/ssl3.h +@@ -587,6 +587,8 @@ + char is_probably_safari; + # endif /* !OPENSSL_NO_EC */ + # endif /* !OPENSSL_NO_TLSEXT */ ++ /* Count of the number of consecutive warning alerts received */ ++ unsigned int alert_count; + } SSL3_STATE; + + # endif +--- crypto/openssl/ssl/ssl_locl.h.orig ++++ crypto/openssl/ssl/ssl_locl.h +@@ -389,6 +389,8 @@ + */ + # define SSL_MAX_DIGEST 6 + ++# define MAX_WARN_ALERT_COUNT 5 ++ + # define TLS1_PRF_DGST_MASK (0xff << TLS1_PRF_DGST_SHIFT) + + # define TLS1_PRF_DGST_SHIFT 10 Added: head/share/security/patches/SA-16:35/openssl-10.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:35/openssl-10.patch.asc Wed Nov 2 07:45:10 2016 (r49623) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.15 (FreeBSD) + +iQIcBAABCgAGBQJYGZiEAAoJEO1n7NZdz2rnVlMP/iC0pDsRby5HftZwmlfd0oIA +GsyDBXQf3H2lFrkb5rFKuiDEwMIV1s2uti64TFg5ipYejXXGjkl6r4ogsWFfa2gy +KU6+R4psMOC4C5aVS7QvclIJiyaBNFuAKaoGgv6p/SXYcw9Rbta6BYIy4s0Mr2WB +UiVzTsJg7Ye6ooKREFouZrW98o5VwcRHy22TONnvkTym2Qr1kDU3PuF/TRe6KK/n +IrRs/VI0Hs+VNBRRxIo74zXJm6GLHcadjU8RejVH3iJfQvK6yfyD+S/zhZxLAc9c +zfcNs9RTBxJhKhrfC/mYU+8pF/4t7viRjb/YrHMvnYZXiOygeRTCeIpcbNun/bqy +hBYOZfzdfF0OgAzBviJSU3dx7HHCmzuKNgtxNFh9nsP41E28hy3/jXOkW6476JvK +bfa3RNAIespSqMBR/8DOj16uuDiAp8nZdV5XcOlgcv/Cl992pf+V8+IpZiApJJpR +yrbdS5oBTuiS5nWJRllH1XSEDPA5zpsfcIpbe+2ip81Uxn5cV2+nXI7nRhzGKcSm +/KSqC5ois3EMyfBocTtexy4bDAZZRTSusauLxLh6qR7y92vbckukZLEUeo5XRtOk +BZt63O16ALxUQbYhVoL6Wm/j4xWiL6+s9q/Y8CAgZniviih3UEcFzpKKxglnApZG +XtVDN3i4EaZ2+8mriBp6 +=0PWO +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-16:35/openssl-9.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:35/openssl-9.patch Wed Nov 2 07:45:10 2016 (r49623) @@ -0,0 +1,94 @@ +--- crypto/openssl/ssl/d1_pkt.c.orig ++++ crypto/openssl/ssl/d1_pkt.c +@@ -820,6 +820,13 @@ + goto start; + } + ++ /* ++ * Reset the count of consecutive warning alerts if we've got a non-empty ++ * record that isn't an alert. ++ */ ++ if (rr->type != SSL3_RT_ALERT && rr->length != 0) ++ s->s3->alert_count = 0; ++ + /* we now have a packet which can be read and processed */ + + if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec, +@@ -1043,6 +1050,14 @@ + + if (alert_level == 1) { /* warning */ + s->s3->warn_alert = alert_descr; ++ ++ s->s3->alert_count++; ++ if (s->s3->alert_count == MAX_WARN_ALERT_COUNT) { ++ al = SSL_AD_UNEXPECTED_MESSAGE; ++ SSLerr(SSL_F_DTLS1_READ_BYTES, SSL_R_TOO_MANY_WARN_ALERTS); ++ goto f_err; ++ } ++ + if (alert_descr == SSL_AD_CLOSE_NOTIFY) { + s->shutdown |= SSL_RECEIVED_SHUTDOWN; + return (0); +--- crypto/openssl/ssl/s3_pkt.c.orig ++++ crypto/openssl/ssl/s3_pkt.c +@@ -922,6 +922,13 @@ + return (ret); + } + ++ /* ++ * Reset the count of consecutive warning alerts if we've got a non-empty ++ * record that isn't an alert. ++ */ ++ if (rr->type != SSL3_RT_ALERT && rr->length != 0) ++ s->s3->alert_count = 0; ++ + /* we now have a packet which can be read and processed */ + + if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec, +@@ -1121,6 +1128,14 @@ + + if (alert_level == 1) { /* warning */ + s->s3->warn_alert = alert_descr; ++ ++ s->s3->alert_count++; ++ if (s->s3->alert_count == MAX_WARN_ALERT_COUNT) { ++ al = SSL_AD_UNEXPECTED_MESSAGE; ++ SSLerr(SSL_F_SSL3_READ_BYTES, SSL_R_TOO_MANY_WARN_ALERTS); ++ goto f_err; ++ } ++ + if (alert_descr == SSL_AD_CLOSE_NOTIFY) { + s->shutdown |= SSL_RECEIVED_SHUTDOWN; + return (0); +--- crypto/openssl/ssl/ssl.h.orig ++++ crypto/openssl/ssl/ssl.h +@@ -2195,6 +2195,7 @@ + # define SSL_R_TLSV1_UNSUPPORTED_EXTENSION 1110 + # define SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER 232 + # define SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST 227 ++# define SSL_R_TOO_MANY_WARN_ALERTS 409 + # define SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST 233 + # define SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG 234 + # define SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER 235 +--- crypto/openssl/ssl/ssl3.h.orig ++++ crypto/openssl/ssl/ssl3.h +@@ -491,6 +491,8 @@ + char is_probably_safari; + # endif /* !OPENSSL_NO_EC */ + # endif /* !OPENSSL_NO_TLSEXT */ ++ /* Count of the number of consecutive warning alerts received */ ++ unsigned int alert_count; + } SSL3_STATE; + + /* SSLv3 */ +--- crypto/openssl/ssl/ssl_locl.h.orig ++++ crypto/openssl/ssl/ssl_locl.h +@@ -247,6 +247,8 @@ + # define DEC32(a) ((a)=((a)-1)&0xffffffffL) + # define MAX_MAC_SIZE 20 /* up from 16 for SSLv3 */ + ++# define MAX_WARN_ALERT_COUNT 5 ++ + /* + * Define the Bitmasks for SSL_CIPHER.algorithms. + * This bits are used packed as dense as possible. If new methods/ciphers Added: head/share/security/patches/SA-16:35/openssl-9.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:35/openssl-9.patch.asc Wed Nov 2 07:45:10 2016 (r49623) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.15 (FreeBSD) + +iQIcBAABCgAGBQJYGZiEAAoJEO1n7NZdz2rnnpgP/RDo7UkBM/p/JjDZam+hTaYN +zhGZdsBG2tG9Q28SBoJ7MVzry287DkG+/LSfupeqbgsyhuYv4/c+148yK01q8Yw1 +d76zQR+3me2scQ6+kfm+lqYTbqSj6zEZXPU4ND29jEIDhz8BTZTlcyv1rZWrlA6d +FjbFNJQcb74ZbF6JRs1uSIrim3LKQf+Dt6ZUSF0+5zY3SLawXtmPVlvCJ1pYlYRk +4hhCzdojtA8PhQmMpW0RiN9NJX5dJ9sBIHAYQ2Y4zET+2cMA10nvCpixRMnjFriT +Dzpnj+PmF0X6bRh1z6tdM0GmcJxHlzgBCFQcxuWilsezlpdboijOCd4uOha+nr6b +qUJG2ahfZtlvofjUrMVhOK/wyyzztU9+qyQzI6bd4H56gjshR05Ey1BxsyA0+tnW +rLyvYfMIvA5aB52WKeZjOZtXQ8NcKDOmpewAO75hAHEfPD3VknN8FahmbAKcv5Y5 +0PjwiZ//dlp4lvoCYCXEMcLjmmOAOSp+rxFgb/ik4M/K62KhAEBw1QTYTQ4oUpgC +cwWA8vfFtqOYJj/XXn+9NY20YOfobmCmcQ8Hlni8D+X1UD8W/mjkKu9pjkbHDJKo +G2jLJmI0s6hsOPxXWwmWfuC0H/dMry/p790NA8RL2E2JV5bv7TWOCwWNYLTw7UK6 +WNX4+gnV9EucX+/fjxXL +=bOQ8 +-----END PGP SIGNATURE----- Modified: head/share/xml/advisories.xml ============================================================================== --- head/share/xml/advisories.xml Wed Nov 2 07:38:59 2016 (r49622) +++ head/share/xml/advisories.xml Wed Nov 2 07:45:10 2016 (r49623) @@ -8,6 +8,26 @@ 2016 + 11 + + + 2 + + + FreeBSD-SA-16:35.openssl + + + + FreeBSD-SA-16:34.bind + + + + FreeBSD-SA-16:33.openssh + + + + + 10 From owner-svn-doc-all@freebsd.org Wed Nov 2 07:47:39 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 99496C2A8D9; Wed, 2 Nov 2016 07:47:39 +0000 (UTC) (envelope-from delphij@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 0219316F6; Wed, 2 Nov 2016 07:47:38 +0000 (UTC) (envelope-from delphij@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA27lctG086253; Wed, 2 Nov 2016 07:47:38 GMT (envelope-from delphij@FreeBSD.org) Received: (from delphij@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA27lcH7086252; Wed, 2 Nov 2016 07:47:38 GMT (envelope-from delphij@FreeBSD.org) Message-Id: <201611020747.uA27lcH7086252@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: delphij set sender to delphij@FreeBSD.org using -f From: Xin LI Date: Wed, 2 Nov 2016 07:47:38 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49624 - head/share/xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 07:47:39 -0000 Author: delphij Date: Wed Nov 2 07:47:37 2016 New Revision: 49624 URL: https://svnweb.freebsd.org/changeset/doc/49624 Log: Remove a duplicated entry. Modified: head/share/xml/advisories.xml Modified: head/share/xml/advisories.xml ============================================================================== --- head/share/xml/advisories.xml Wed Nov 2 07:45:10 2016 (r49623) +++ head/share/xml/advisories.xml Wed Nov 2 07:47:37 2016 (r49624) @@ -36,10 +36,6 @@ FreeBSD-SA-16:32.bhyve - - - FreeBSD-SA-16:15.sysarch - From owner-svn-doc-all@freebsd.org Wed Nov 2 09:26:42 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1618AC2B9F6; Wed, 2 Nov 2016 09:26:42 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B4EFD16F7; Wed, 2 Nov 2016 09:26:41 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA29QeA7025524; Wed, 2 Nov 2016 09:26:40 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA29QeYB025523; Wed, 2 Nov 2016 09:26:40 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201611020926.uA29QeYB025523@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Wed, 2 Nov 2016 09:26:40 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49625 - head/ja_JP.eucJP/books/handbook/kernelconfig X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 09:26:42 -0000 Author: ryusuke Date: Wed Nov 2 09:26:40 2016 New Revision: 49625 URL: https://svnweb.freebsd.org/changeset/doc/49625 Log: - Merge the following from the English version: r46043 -> r49609 head/ja_JP.eucJP/books/handbook/kernelconfig/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/kernelconfig/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/kernelconfig/chapter.xml ============================================================================== --- head/ja_JP.eucJP/books/handbook/kernelconfig/chapter.xml Wed Nov 2 07:47:37 2016 (r49624) +++ head/ja_JP.eucJP/books/handbook/kernelconfig/chapter.xml Wed Nov 2 09:26:40 2016 (r49625) @@ -3,7 +3,7 @@ The FreeBSD Documentation Project The FreeBSD Japanese Documentation Project - Original revision: r46043 + Original revision: r49609 $FreeBSD$ --> &man.man.1; ե饰Ǽ¹Ԥȡ ͭѤʾ뤳ȤǤޤȤС - ñޤޥ˥奢ڡΰɽˤϡ - ʲΤ褦ˤʤޤ + ΥǥХ֥ɤ̾ޤޥ˥奢ڡΰɽˤϡ + ʲΤ褦˼¹ԤƤ &prompt.root; man -k Atheros From owner-svn-doc-all@freebsd.org Wed Nov 2 13:49:24 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2122EC2B8FB; Wed, 2 Nov 2016 13:49:24 +0000 (UTC) (envelope-from wblock@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 9C37E1F36; Wed, 2 Nov 2016 13:49:23 +0000 (UTC) (envelope-from wblock@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2DnMcX027992; Wed, 2 Nov 2016 13:49:22 GMT (envelope-from wblock@FreeBSD.org) Received: (from wblock@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2DnM19027991; Wed, 2 Nov 2016 13:49:22 GMT (envelope-from wblock@FreeBSD.org) Message-Id: <201611021349.uA2DnM19027991@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: wblock set sender to wblock@FreeBSD.org using -f From: Warren Block Date: Wed, 2 Nov 2016 13:49:22 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49626 - head/en_US.ISO8859-1/htdocs/news/status X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 13:49:24 -0000 Author: wblock Date: Wed Nov 2 13:49:22 2016 New Revision: 49626 URL: https://svnweb.freebsd.org/changeset/doc/49626 Log: Fix name, expand contraction. Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Wed Nov 2 09:26:40 2016 (r49625) +++ head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Wed Nov 2 13:49:22 2016 (r49626) @@ -1840,7 +1840,7 @@

      We also published monthly newsletters to highlight work being done to support &os;, tell you about upcoming events, and - provide other information to keep you in the loop of what we’re doing + provide other information to keep you in the loop of what we are doing to support the &os; Project and community https://www.FreeBSDFoundation.org/news-and-events/newsletter/.

      @@ -1895,7 +1895,7 @@
    • Held a Women in Tech BoF in partnership with ACM-W Europe
    • -
    • Bennedict organized the EuroBSDcon Developer +
    • Benedict organized the EuroBSDcon Developer Summit
    • Deb gave a Foundation Update talk and Hiroki Sato and From owner-svn-doc-all@freebsd.org Wed Nov 2 13:51:39 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BFFC6C2BA5E; Wed, 2 Nov 2016 13:51:39 +0000 (UTC) (envelope-from rcyu@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 511281A31; Wed, 2 Nov 2016 13:51:39 +0000 (UTC) (envelope-from rcyu@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2Dpc51030836; Wed, 2 Nov 2016 13:51:38 GMT (envelope-from rcyu@FreeBSD.org) Received: (from rcyu@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2Dpc9p030834; Wed, 2 Nov 2016 13:51:38 GMT (envelope-from rcyu@FreeBSD.org) Message-Id: <201611021351.uA2Dpc9p030834@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rcyu set sender to rcyu@FreeBSD.org using -f From: Ruey-Cherng Yu Date: Wed, 2 Nov 2016 13:51:38 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49627 - in head/zh_TW.UTF-8: htdocs share/xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 13:51:40 -0000 Author: rcyu Date: Wed Nov 2 13:51:38 2016 New Revision: 49627 URL: https://svnweb.freebsd.org/changeset/doc/49627 Log: Change the css layout link to &enbase Approved by: kevlo(mentor) Modified: head/zh_TW.UTF-8/htdocs/Makefile head/zh_TW.UTF-8/share/xml/header.l10n.ent Modified: head/zh_TW.UTF-8/htdocs/Makefile ============================================================================== --- head/zh_TW.UTF-8/htdocs/Makefile Wed Nov 2 13:49:22 2016 (r49626) +++ head/zh_TW.UTF-8/htdocs/Makefile Wed Nov 2 13:51:38 2016 (r49627) @@ -38,7 +38,7 @@ SUBDIR+= doc .endif # Non-XML -SUBDIR+= layout +#SUBDIR+= layout WEBDIR?= data/zh_TW Modified: head/zh_TW.UTF-8/share/xml/header.l10n.ent ============================================================================== --- head/zh_TW.UTF-8/share/xml/header.l10n.ent Wed Nov 2 13:49:22 2016 (r49626) +++ head/zh_TW.UTF-8/share/xml/header.l10n.ent Wed Nov 2 13:51:38 2016 (r49627) @@ -16,8 +16,8 @@ - - + + Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 14E33C2B59F; Wed, 2 Nov 2016 18:13:44 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 6BDAF1783; Wed, 2 Nov 2016 18:13:43 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2IDgTm031948; Wed, 2 Nov 2016 18:13:42 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2IDgNR031945; Wed, 2 Nov 2016 18:13:42 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201611021813.uA2IDgNR031945@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Wed, 2 Nov 2016 18:13:42 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49628 - in head/en_US.ISO8859-1/htdocs/releases: 10.3R 11.0R 9.3R X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 18:13:44 -0000 Author: gjb Date: Wed Nov 2 18:13:42 2016 New Revision: 49628 URL: https://svnweb.freebsd.org/changeset/doc/49628 Log: Regen after r308226. Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html Wed Nov 2 13:51:38 2016 (r49627) +++ head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html Wed Nov 2 18:13:42 2016 (r49628) @@ -1,5 +1,5 @@ -FreeBSD 10.3-RELEASE Errata

      FreeBSD 10.3-RELEASE Errata

      The FreeBSD Project

      FreeBSD 10.3-RELEASE Errata

      The FreeBSD Project

      FreeBSD is a registered trademark of the FreeBSD Foundation.

      Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered @@ -43,7 +43,9 @@ vulnerability

    • FreeBSD-SA-16:23.libarchive31May2016

      Absolute path traversal vulnerability

      FreeBSD-SA-16:24.ntp3June2016

      Multiple ntp vulnerabilties

      FreeBSD-SA-16:25.bspatch25July2016

      heap overflow vulnerability

      FreeBSD-SA-16:26.openssl23September2016

      Multiple vulnerabilities

      FreeBSD-SA-16:27.openssl26September2016

      Regression in OpenSSL - suite

      FreeBSD-SA-16:29.bspatch10October2016

      Heap overflow vulnerability

      FreeBSD-SA-16:30.portsnap10October2016

      Multiple vulnerabilities

      FreeBSD-SA-16:31.libarchive10October2016

      Multiple vulnerabilities

      3.Errata Notices

      ErrataDateTopic
      FreeBSD-EN-16:06.libc4May2016

      Performance regression in libc + suite

      FreeBSD-SA-16:29.bspatch10October2016

      Heap overflow vulnerability

      FreeBSD-SA-16:30.portsnap10October2016

      Multiple vulnerabilities

      FreeBSD-SA-16:31.libarchive10October2016

      Multiple vulnerabilities

      FreeBSD-SA-16:33.openssh 2November2016

      Remote Denial of Service + vulnerability

      FreeBSD-SA-16:35.openssl2November2016

      Remote Denial of Service + vulnerability

      3.Errata Notices

      ErrataDateTopic
      FreeBSD-EN-16:06.libc4May2016

      Performance regression in libc hash(3)

      FreeBSD-EN-16:07.ipi4May2016

      Excessive latency in x86 IPI delivery

      FreeBSD-EN-16:08.zfs4May2016

      Memory leak in ZFS

      FreeBSD-EN-16:09.freebsd-update25July2016

      Fix freebsd-update(8) support of FreeBSD11.0-RELEASE

      FreeBSD-EN-16:10.dhclient11August2016

      Better handle unknown options received from Modified: head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html Wed Nov 2 13:51:38 2016 (r49627) +++ head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html Wed Nov 2 18:13:42 2016 (r49628) @@ -1,5 +1,5 @@ -FreeBSD 11.0-RELEASE Errata

      FreeBSD 11.0-RELEASE Errata

      The FreeBSD Project

      FreeBSD is a registered trademark of +FreeBSD 11.0-RELEASE Errata

      FreeBSD 11.0-RELEASE Errata

      The FreeBSD Project

      FreeBSD is a registered trademark of the FreeBSD Foundation.

      Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United @@ -36,7 +36,8 @@ which keep up-to-date mirrors of this location.

      Source and binary snapshots of FreeBSD 11.0-STABLE also contain up-to-date copies of this document (as of the time of the snapshot).

      For a list of all FreeBSD CERT security advisories, see - https://www.FreeBSD.org/security/.

      2.Security Advisories

      AdvisoryDateTopic
      FreeBSD-SA-16:32.bhyve25October2016

      Privilege escalation vulnerability

      3.Errata Notices

      ErrataDateTopic
      FreeBSD-EN-16:18.loader25October2016

      Loader may hang during boot

      4.Open Issues

      2.Security Advisories

      AdvisoryDateTopic
      FreeBSD-SA-16:32.bhyve25October2016

      Privilege escalation vulnerability

      FreeBSD-SA-16:33.openssh2November2016

      Remote Denial of Service + vulnerability

      3.Errata Notices

      ErrataDateTopic
      FreeBSD-EN-16:18.loader25October2016

      Loader may hang during boot

      4.Open Issues

      • An issue was discovered with Amazon EC2™ images which would cause the virtual machine to hang during boot when upgrading from previous FreeBSD versions. New EC2™ installations are not affected, but existing Modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Wed Nov 2 13:51:38 2016 (r49627) +++ head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Wed Nov 2 18:13:42 2016 (r49628) @@ -1,5 +1,5 @@ -FreeBSD 9.3-RELEASE Errata

        FreeBSD 9.3-RELEASE Errata

        +FreeBSD 9.3-RELEASE Errata

        FreeBSD 9.3-RELEASE Errata

        The FreeBSD Project

        FreeBSD is a registered trademark of the FreeBSD Foundation.

        Intel, Celeron, Centrino, Core, EtherExpress, i386, @@ -75,7 +75,9 @@ vulnerability

      FreeBSD-SA-16:24.ntp3June2016

      Multiple ntp vulnerabilties

      FreeBSD-SA-16:25.bspatch25July2016

      heap overflow vulnerability

      FreeBSD-SA-16:26.openssl23September2016

      Multiple vulnerabilities

      FreeBSD-SA-16:27.openssl26September2016

      Regression in OpenSSL suite

      FreeBSD-SA-16:28.bind10October2016

      BIND denial of - service

      FreeBSD-SA-16:29.bspatch10October2016

      Heap overflow vulnerability

      FreeBSD-SA-16:30.portsnap10October2016

      Multiple vulnerabilities

      FreeBSD-SA-16:31.libarchive10October2016

      Multiple vulnerabilities

      3.Errata Notices

      ErrataDateTopic
      FreeBSD-EN-14:10.tzdata21October2014

      Time zone data file update

      FreeBSD-EN-14:11.crypt21October2014

      Change crypt(3) default h! ashing algorithm + service

      FreeBSD-SA-16:29.bspatch10October2016

      Heap overflow vulnerability

      FreeBSD-SA-16:30.portsnap10October2016

      Multiple vulnerabilities

      FreeBSD-SA-16:31.libarchive10October2016

      Multiple vulnerabilities

      FreeBSD-SA-16:34.bind 2November2016

      Remote Denial of Service + vulnerability

      FreeBSD-SA-16:35.openssl2November2016

      Remote Denial of Service + vulnerability

      3.Errata Notices

      ErrataDateTopic
      FreeBSD-EN-14:10.tzdata21October2014

      Time zone data file update

      FreeBSD-EN-14:11.crypt21October2014

      Change crypt(3) default hashing algorithm back to DES

      FreeBSD-EN-14:12.zfs11November2014

      Fix NFSv4 and ZFS cache consistency issue

      FreeBSD-EN-14:13.freebsd-update23December2014

      Fixed directory deletion issue in freebsd-update(8)

      FreeBSD-EN-15:01.vt25February2015

      vt(4) crash with improper ioctl From owner-svn-doc-all@freebsd.org Wed Nov 2 18:42:56 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2C717C2C19E; Wed, 2 Nov 2016 18:42:56 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BC93518A6; Wed, 2 Nov 2016 18:42:55 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2IgsVO043799; Wed, 2 Nov 2016 18:42:54 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2IgsEJ043798; Wed, 2 Nov 2016 18:42:54 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201611021842.uA2IgsEJ043798@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Wed, 2 Nov 2016 18:42:54 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49629 - head/de_DE.ISO8859-1/books/handbook/virtualization X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 18:42:56 -0000 Author: bhd Date: Wed Nov 2 18:42:54 2016 New Revision: 49629 URL: https://svnweb.freebsd.org/changeset/doc/49629 Log: Update to r49599: USB pass-through in VirtualBox is currently not supported. Modified: head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml Wed Nov 2 18:13:42 2016 (r49628) +++ head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml Wed Nov 2 18:42:54 2016 (r49629) @@ -5,7 +5,7 @@ $FreeBSD$ $FreeBSDde: de-docproj/books/handbook/virtualization/chapter.xml,v 1.14 2010/07/03 14:29:30 jkois Exp $ - basiert auf: r49368 + basiert auf: r49599 --> USB Untersttzung fr &virtualbox; - Um auf USB-Gerte lesend und schreibend - zuzugreifen, mssen Benutzer Mitglied der Gruppe - operator - sein: - - &prompt.root; pw groupmod operator -m jerry - - Fgen Sie dann folgenden Eintrag in - /etc/devfs.rules hinzu. Erstellen Sie - die Datei, wenn sie nicht bereits existiert: - - [system=10] -add path 'usb/*' mode 0660 group operator - - Um diese neuen Regeln zu laden, fgen Sie folgenden - Eintrag in /etc/rc.conf hinzu: - - devfs_system_ruleset="system" - - Danach starten Sie devfs neu: - - &prompt.root; service devfs restart - - USB kann nun im Gastsystem aktiviert - werden. Die USB-Gerte sollten nun in den - &virtualbox; Einstellungen sichtbar sein. + Das &virtualbox; + Erweiterungspaket ist fr &os;-Hosts nicht verfgbar. Ohne + dieses Erweiterungspaket kann der &os;-Host keine + USB-Ports an das Gastsystem + durchreichen. From owner-svn-doc-all@freebsd.org Wed Nov 2 22:53:00 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0537AC2C97D; Wed, 2 Nov 2016 22:53:00 +0000 (UTC) (envelope-from mat@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C7D6918C8; Wed, 2 Nov 2016 22:52:59 +0000 (UTC) (envelope-from mat@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2MqwEm041676; Wed, 2 Nov 2016 22:52:58 GMT (envelope-from mat@FreeBSD.org) Received: (from mat@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2Mqw2m041675; Wed, 2 Nov 2016 22:52:58 GMT (envelope-from mat@FreeBSD.org) Message-Id: <201611022252.uA2Mqw2m041675@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: mat set sender to mat@FreeBSD.org using -f From: Mathieu Arnold Date: Wed, 2 Nov 2016 22:52:58 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49631 - head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 22:53:00 -0000 Author: mat Date: Wed Nov 2 22:52:58 2016 New Revision: 49631 URL: https://svnweb.freebsd.org/changeset/doc/49631 Log: Put each version in its section. Approved by: wblock Sponsored by: Absolight Differential Revision: https://reviews.freebsd.org/D8362 Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:52:54 2016 (r49630) +++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:52:58 2016 (r49631) @@ -16,6 +16,9 @@ sys/param.h: + + &os; 2 before 2.2-RELEASE versions + &os; 2 before 2.2-RELEASE <literal>__FreeBSD_version</literal> Values @@ -93,6 +96,10 @@
      +
      + + + &os; 2.2 versions &os; 2.2 <literal>__FreeBSD_version</literal> Values @@ -218,6 +225,10 @@ their real release dates. Do not worry about old -CURRENTs; they are listed here just for reference. + + + + &os; 3 versions
      &os; 3 <literal>__FreeBSD_version</literal> Values @@ -365,6 +376,10 @@
      +
      + + + &os; 4 versions &os; 4 <literal>__FreeBSD_version</literal> Values @@ -830,6 +845,10 @@
      +
      + + + &os; 5 versions &os; 5 <literal>__FreeBSD_version</literal> Values @@ -1720,6 +1739,10 @@
      +
      + + + &os; 6 versions &os; 6 <literal>__FreeBSD_version</literal> Values @@ -2249,6 +2272,10 @@
      +
      + + + &os; 7 versions &os; 7 <literal>__FreeBSD_version</literal> Values @@ -2909,6 +2936,10 @@
      +
      + + + &os; 8 versions &os; 8 <literal>__FreeBSD_version</literal> Values @@ -4034,6 +4065,10 @@
      +
      + + + &os; 9 versions &os; 9 <literal>__FreeBSD_version</literal> Values @@ -4686,6 +4721,10 @@
      +
      + + + &os; 10 versions &os; 10 <literal>__FreeBSD_version</literal> Values @@ -5626,6 +5665,10 @@
      +
      + + + &os; 11 versions &os; 11 <literal>__FreeBSD_version</literal> Values @@ -6413,6 +6456,10 @@
      +
      + + + &os; 12 versions &os; 12 <literal>__FreeBSD_version</literal> Values @@ -6445,4 +6492,5 @@
      +
      From owner-svn-doc-all@freebsd.org Wed Nov 2 22:52:56 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 46487C2C970; Wed, 2 Nov 2016 22:52:56 +0000 (UTC) (envelope-from mat@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 002B9188D; Wed, 2 Nov 2016 22:52:55 +0000 (UTC) (envelope-from mat@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2Mqt5Z041632; Wed, 2 Nov 2016 22:52:55 GMT (envelope-from mat@FreeBSD.org) Received: (from mat@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2MqtT6041631; Wed, 2 Nov 2016 22:52:55 GMT (envelope-from mat@FreeBSD.org) Message-Id: <201611022252.uA2MqtT6041631@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: mat set sender to mat@FreeBSD.org using -f From: Mathieu Arnold Date: Wed, 2 Nov 2016 22:52:55 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49630 - head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 22:52:56 -0000 Author: mat Date: Wed Nov 2 22:52:54 2016 New Revision: 49630 URL: https://svnweb.freebsd.org/changeset/doc/49630 Log: Split up the __FreeBSD_version table per releases. Move the note about FreeBSD 2.2-STABLE after the FreeBSD 2.2 table. Approved by: wblock Sponsored by: Absolight Differential Revision: https://reviews.freebsd.org/D8362 Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 18:42:54 2016 (r49629) +++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:52:54 2016 (r49630) @@ -16,8 +16,8 @@ sys/param.h: - - <literal>__FreeBSD_version</literal> Values +
      + &os; 2 before 2.2-RELEASE <literal>__FreeBSD_version</literal> Values @@ -90,7 +90,25 @@ 2.1.7-RELEASE + + +
      + + + &os; 2.2 <literal>__FreeBSD_version</literal> Values + + + + Value + + Date + + Release + + + + 220000 February 19, 1997 @@ -186,7 +204,36 @@ November 29, 1998 2.2-STABLE after 2.2.8-RELEASE + + +
      + + + Note that 2.2-STABLE sometimes identifies itself as + 2.2.5-STABLE after the 2.2.5-RELEASE. The + pattern used to be year followed by the month, but we decided to + change it to a more straightforward major/minor system starting + from 2.2. This is because the parallel development on several + branches made it infeasible to classify the releases merely by + their real release dates. Do not worry about old -CURRENTs; + they are listed here just for reference. + + + + &os; 3 <literal>__FreeBSD_version</literal> Values + + + + + Value + + Date + + Release + + + 300000 February 19, 1996 @@ -315,7 +362,25 @@ July 12, 2000 3.5-STABLE + + +
      + + + &os; 4 <literal>__FreeBSD_version</literal> Values + + + + Value + + Date + + Release + + + + 400000 January 22, 1999 @@ -762,7 +827,25 @@ 4.11-STABLE after adding libdata/ldconfig directories to mtree files. + + +
      + + + &os; 5 <literal>__FreeBSD_version</literal> Values + + + + Value + + Date + + Release + + + + 500000 March 13, 2000 @@ -1634,7 +1717,25 @@ May 12, 2006 5.5-STABLE after branching for RELENG_5_5 + + +
      + + + &os; 6 <literal>__FreeBSD_version</literal> Values + + + + + Value + + Date + + Release + + + 600000 August 18, 2004 @@ -2145,7 +2246,25 @@ October 4, 2008 6.4-STABLE after 6.4-RELEASE. + + +
      + + + &os; 7 <literal>__FreeBSD_version</literal> Values + + + + + Value + + Date + + Release + + + 700000 July 11, 2005 @@ -2787,7 +2906,25 @@ December 22, 2010 7.4-STABLE after 7.4-RELEASE. + + +
      + + + &os; 8 <literal>__FreeBSD_version</literal> Values + + + + Value + + Date + + Release + + + + 800000 October 11, 2007 @@ -3894,7 +4031,25 @@ FreeBSD-SA-15:04.igmp, and FreeBSD-SA-15:05.bind (rev 279287). + + +
      + + + &os; 9 <literal>__FreeBSD_version</literal> Values + + + + + Value + + Date + + Release + + + 900000 August 22, 2009 @@ -4528,7 +4683,25 @@ 2.6.18 to support the linux-c6-* ports out of the box (rev 296219). + + +
      + + + &os; 10 <literal>__FreeBSD_version</literal> Values + + + + Value + + Date + + Release + + + + 1000000 September 26, 2011 @@ -5450,7 +5623,25 @@ 10-STABLE after converting sed to use REG_STARTEND, fixing a Mesa issue (rev 302228). + + +
      + + + &os; 11 <literal>__FreeBSD_version</literal> Values + + + + Value + + Date + + Release + + + + 1100000 October 10, 2013 @@ -6219,7 +6410,25 @@ branched from 11-STABLE (rev 303975). + + +
      + + &os; 12 <literal>__FreeBSD_version</literal> Values + + + + + Value + + Date + + Release + + + + 1200000 July 7, 2016 @@ -6236,15 +6445,4 @@
      - - - Note that 2.2-STABLE sometimes identifies itself as - 2.2.5-STABLE after the 2.2.5-RELEASE. The - pattern used to be year followed by the month, but we decided to - change it to a more straightforward major/minor system starting - from 2.2. This is because the parallel development on several - branches made it infeasible to classify the releases merely by - their real release dates. Do not worry about old -CURRENTs; - they are listed here just for reference. - From owner-svn-doc-all@freebsd.org Wed Nov 2 22:53:04 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 24289C2C9A3; Wed, 2 Nov 2016 22:53:04 +0000 (UTC) (envelope-from mat@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 6071D1926; Wed, 2 Nov 2016 22:53:03 +0000 (UTC) (envelope-from mat@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2Mr2KQ041727; Wed, 2 Nov 2016 22:53:02 GMT (envelope-from mat@FreeBSD.org) Received: (from mat@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2Mr2MZ041726; Wed, 2 Nov 2016 22:53:02 GMT (envelope-from mat@FreeBSD.org) Message-Id: <201611022253.uA2Mr2MZ041726@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: mat set sender to mat@FreeBSD.org using -f From: Mathieu Arnold Date: Wed, 2 Nov 2016 22:53:02 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49632 - head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 22:53:04 -0000 Author: mat Date: Wed Nov 2 22:53:02 2016 New Revision: 49632 URL: https://svnweb.freebsd.org/changeset/doc/49632 Log: Reverse the order of the sections, newest first. Approved by: wblock Sponsored by: Absolight Differential Revision: https://reviews.freebsd.org/D8362 Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:52:58 2016 (r49631) +++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:53:02 2016 (r49632) @@ -16,11 +16,11 @@ sys/param.h: - - &os; 2 before 2.2-RELEASE versions + + &os; 12 versions - - &os; 2 before 2.2-RELEASE <literal>__FreeBSD_version</literal> Values +
      + &os; 12 <literal>__FreeBSD_version</literal> Values @@ -34,75 +34,29 @@ - - 119411 - - 2.0-RELEASE - - - - 199501, 199503 - March 19, 1995 - 2.1-CURRENT - - - - 199504 - April 9, 1995 - 2.0.5-RELEASE - - - - 199508 - August 26, 1995 - 2.2-CURRENT before 2.1 - - - - 199511 - November 10, 1995 - 2.1.0-RELEASE - - - - 199512 - November 10, 1995 - 2.2-CURRENT before 2.1.5 - - - - 199607 - July 10, 1996 - 2.1.5-RELEASE - - - - 199608 - July 12, 1996 - 2.2-CURRENT before 2.1.6 - - - - 199612 - November 15, 1996 - 2.1.6-RELEASE - + + 1200000 + July 7, 2016 + 12.0-CURRENT + (rev 302409). + - 199612 - - 2.1.7-RELEASE + 1200004 + August 24, 2016 + 12.0-CURRENT after fixing LC_*_MASK for newlocale(3) and querylocale(3) + (rev 304703).
      - - &os; 2.2 versions + + &os; 11 versions - - &os; 2.2 <literal>__FreeBSD_version</literal> Values +
      + &os; 11 <literal>__FreeBSD_version</literal> Values @@ -117,741 +71,783 @@ - 220000 - February 19, 1997 - 2.2-RELEASE + 1100000 + October 10, 2013 + 11.0-CURRENT + (rev 256284). - (not changed) - - 2.2.1-RELEASE + 1100001 + October 19, 2013 + + 11.0-CURRENT after addition of support for "first + boot" rc.d scripts, so ports can make + use of this (rev 256776). - (not changed) - - 2.2-STABLE after 2.2.1-RELEASE + 1100002 + November 5, 2013 + + 11.0-CURRENT after dropping support for historic + ioctls (rev 257696). - 221001 - April 15, 1997 - 2.2-STABLE after texinfo-3.9 + 1100003 + November 17, 2013 + 11.0-CURRENT after iconv changes + (rev 258284). - 221002 - April 30, 1997 - 2.2-STABLE after top + 1100004 + December 15, 2013 + 11.0-CURRENT after the behavior change of + gss_pseudo_random introduced in + r259286 (rev 259424). - 222000 - May 16, 1997 - 2.2.2-RELEASE + 1100005 + December 28, 2013 + + 11.0-CURRENT after r259951 - Do not coalesce entries + in vm_map_stack() (rev + 260010). - 222001 - May 19, 1997 - 2.2-STABLE after 2.2.2-RELEASE + 1100006 + January 28, 2014 + 11.0-CURRENT after upgrades of libelf and libdwarf + (rev 261246). - 225000 - October 2, 1997 - 2.2.5-RELEASE + 1100007 + January 30, 2014 + 11.0-CURRENT after upgrade of libc++ to 3.4 release + (rev 261283). - 225001 - November 20, 1997 - 2.2-STABLE after 2.2.5-RELEASE + 1100008 + February 14, 2014 + 11.0-CURRENT after libc++ 3.4 ABI compatibility fix + (rev 261801). - 225002 - December 27, 1997 - 2.2-STABLE after ldconfig -R merge + 1100009 + February 16, 2014 + 11.0-CURRENT after upgrade of llvm/clang to 3.4 + release (rev 261991). - 226000 - March 24, 1998 - 2.2.6-RELEASE + 1100010 + February 28, 2014 + 11.0-CURRENT after upgrade of ncurses to 5.9 release + (rev 262629). - 227000 - July 21, 1998 - 2.2.7-RELEASE + 1100011 + March 13, 2014 + 11.0-CURRENT after ABI change in struct if_data + (rev 263102). - 227001 - July 21, 1998 - 2.2-STABLE after 2.2.7-RELEASE + 1100012 + March 14, 2014 + 11.0-CURRENT after removal of Novell IPX protocol + support (rev 263140). - 227002 - September 19, 1998 - 2.2-STABLE after &man.semctl.2; change + 1100013 + March 14, 2014 + 11.0-CURRENT after removal of AppleTalk protocol + support (rev 263152). - 228000 - November 29, 1998 - 2.2.8-RELEASE + 1100014 + March 16, 2014 + 11.0-CURRENT after renaming + <sys/capability.h> to + <sys/capsicum.h> to avoid a + clash with similarly named headers in other operating + systems. A compatibility header is left in place to limit + build breakage, but will be deprecated in due course + (rev 263235). - 228001 - November 29, 1998 - 2.2-STABLE after 2.2.8-RELEASE + 1100015 + March 22, 2014 + 11.0-CURRENT after cnt rename to + vm_cnt (rev + 263620). - - -
      - - - Note that 2.2-STABLE sometimes identifies itself as - 2.2.5-STABLE after the 2.2.5-RELEASE. The - pattern used to be year followed by the month, but we decided to - change it to a more straightforward major/minor system starting - from 2.2. This is because the parallel development on several - branches made it infeasible to classify the releases merely by - their real release dates. Do not worry about old -CURRENTs; - they are listed here just for reference. - -
      - - - &os; 3 versions - - &os; 3 <literal>__FreeBSD_version</literal> Values - - - - Value - - Date - - Release + 1100016 + March 23, 2014 + 11.0-CURRENT after addition of + armv6hf TARGET_ARCH + (rev 263660). - - - 300000 - February 19, 1996 - 3.0-CURRENT before &man.mount.2; change + 1100017 + April 4, 2014 + 11.0-CURRENT after GCC support for + __block definition (rev + 264121). - 300001 - September 24, 1997 - 3.0-CURRENT after &man.mount.2; change + 1100018 + April 6, 2014 + 11.0-CURRENT after support for UDP-Lite protocol (RFC + 3828) (rev 264212). - 300002 - June 2, 1998 - 3.0-CURRENT after &man.semctl.2; change + 1100019 + April 8, 2014 + 11.0-CURRENT after FreeBSD-SA-14:06.openssl (rev + 264265). - 300003 - June 7, 1998 - 3.0-CURRENT after ioctl arg changes + 1100020 + May 1, 2014 + 11.0-CURRENT after removing lindev in favor of having + /dev/full by default (rev + 265212). - 300004 - September 3, 1998 - 3.0-CURRENT after ELF conversion + 1100021 + May 6, 2014 + 11.0-CURRENT after src.opts.mk + changes, decoupling &man.make.conf.5; from + buildworld (rev + 265419). - 300005 - October 16, 1998 - 3.0-RELEASE + 1100022 + May 30, 2014 + 11.0-CURRENT after changes to &man.strcasecmp.3;, + moving strcasecmp_l() and + strncasecmp_l() from + <string.h> to + <strings.h> for POSIX 2008 + compliance (rev 266865). - 300006 - October 16, 1998 - 3.0-CURRENT after 3.0-RELEASE + 1100023 + June 13, 2014 + 11.0-CURRENT after the CUSE library and kernel module + have been attached to the build by default (rev + 267440). - 300007 - January 22, 1999 - 3.0-STABLE after 3/4 branch + 1100024 + June 27, 2014 + 11.0-CURRENT after &man.sysctl.3; + API change (rev + 267992). - 310000 - February 9, 1999 - 3.1-RELEASE + 1100025 + June 30, 2014 + 11.0-CURRENT after &man.regex.3; library update + to add > and < + delimiters (rev 268066). - 310001 - March 27, 1999 - 3.1-STABLE after 3.1-RELEASE + 1100026 + July 1, 2014 + 11.0-CURRENT after the internal interface between the + NFS modules, including the krpc, was changed by (rev + 268115). - 310002 - April 14, 1999 - 3.1-STABLE after C++ constructor/destructor order - change + 1100027 + July 8, 2014 + 11.0-CURRENT after FreeBSD-SA-14:17.kmem + (rev 268431). - 320000 - - 3.2-RELEASE + 1100028 + July 21, 2014 + 11.0-CURRENT after hdestroy() + compliance fix changed ABI (rev + 268945). - 320001 - May 8, 1999 - 3.2-STABLE + 1100029 + August 3, 2014 + 11.0-CURRENT after SOCK_DGRAM + bug fix (rev 269489). - 320002 - August 29, 1999 - 3.2-STABLE after binary-incompatible IPFW and - socket changes + 1100030 + September 1, 2014 + 11.0-CURRENT after SOCK_RAW + sockets were changed to not modify packets at all (rev + 270929). - 330000 - September 2, 1999 - 3.3-RELEASE + 1100031 + September 9, 2014 + 11.0-CURRENT after FreeBSD-SA-14:18.openssl + (rev 269686). - 330001 - September 16, 1999 - 3.3-STABLE + 1100032 + September 11, 2014 + 11.0-CURRENT after API changes to + ifa_ifwithbroadaddr, + ifa_ifwithdstaddr, + ifa_ifwithnet, and + ifa_ifwithroute (rev + 271438). - 330002 - November 24, 1999 - 3.3-STABLE after adding &man.mkstemp.3; - to libc + 1100033 + September 9, 2014 + 11.0-CURRENT after changing + access, eaccess, and + faccessat to validate the mode argument + (rev 271657). - 340000 - December 5, 1999 - 3.4-RELEASE + 1100034 + September 16, 2014 + 11.0-CURRENT after FreeBSD-SA-14:19.tcp + (rev 271666). - 340001 - December 17, 1999 - 3.4-STABLE + 1100035 + September 17, 2014 + 11.0-CURRENT after i915 HW context support + (rev 271705). - 350000 - June 20, 2000 - 3.5-RELEASE + 1100036 + September 17, 2014 + Version bump to have ABI note distinguish binaries + ready for strict &man.mmap.2; flags checking + (rev 271724). - 350001 - July 12, 2000 - 3.5-STABLE + 1100037 + October 6, 2014 + 11.0-CURRENT after addition of + &man.explicit.bzero.3; (rev + 272673). - - -
      -
      - - - &os; 4 versions - - &os; 4 <literal>__FreeBSD_version</literal> Values - - - - Value - - Date - - Release + 1100038 + October 11, 2014 + 11.0-CURRENT after cleanup of TCP wrapper headers + (rev 272951). - - - 400000 - January 22, 1999 - 4.0-CURRENT after 3.4 branch + 1100039 + October 18, 2014 + 11.0-CURRENT after removal of + MAP_RENAME and + MAP_NORESERVE (rev + 273250). - 400001 - February 20, 1999 - 4.0-CURRENT after change in dynamic linker - handling + 1100040 + October 21, 2014 + 11.0-CURRENT after FreeBSD-SA-14:23 (rev + 273146). - 400002 - March 13, 1999 - 4.0-CURRENT after C++ constructor/destructor - order change + 1100041 + October 30, 2014 + 11.0-CURRENT after API changes to + syscall_register, + syscall32_register, + syscall_register_helper and + syscall32_register_helper (rev + 273707). - 400003 - March 27, 1999 - 4.0-CURRENT after functioning - &man.dladdr.3; + 1100042 + November 3, 2014 + 11.0-CURRENT after a change to struct + tcpcb (rev + 274046). - 400004 - April 5, 1999 - 4.0-CURRENT after __deregister_frame_info dynamic - linker bug fix (also 4.0-CURRENT after EGCS 1.1.2 - integration) + 1100043 + November 4, 2014 + 11.0-CURRENT after enabling &man.vt.4; by default + (rev 274085). - 400005 - April 27, 1999 - 4.0-CURRENT after &man.suser.9; API change - (also 4.0-CURRENT after newbus) + 1100044 + November 4, 2014 + 11.0-CURRENT after adding new libraries/utilities + (dpv and figpar) for data throughput visualization (rev + 274116). - 400006 - May 31, 1999 - 4.0-CURRENT after cdevsw registration - change + 1100045 + November 4, 2014 + 11.0-CURRENT after FreeBSD-SA-14:23, + FreeBSD-SA-14:24, and FreeBSD-SA-14:25 (rev + 274162). - 400007 - June 17, 1999 - 4.0-CURRENT after the addition of so_cred for - socket level credentials + 1100046 + November 13, 2014 + 11.0-CURRENT after kern_poll + signature change (rev + 274462). - 400008 - June 20, 1999 - 4.0-CURRENT after the addition of a poll syscall - wrapper to libc_r + 1100047 + November 13, 2014 + 11.0-CURRENT after removal of no-at version + of VFS syscalls helpers, like kern_open + (rev 274476). - 400009 - July 20, 1999 - 4.0-CURRENT after the change of the kernel's - dev_t type to struct - specinfo pointer + 1100048 + December 1, 2014 + 11.0-CURRENT after starting the process of removing + the use of the deprecated "M_FLOWID" flag from the network + code (rev 275358). - 400010 - September 25, 1999 - 4.0-CURRENT after fixing a hole - in &man.jail.2; + 1100049 + December 9, 2014 + 11.0-CURRENT after importing an important fix to the + LLVM vectorizer, which could lead to buffer overruns in + some cases (rev 275633). - 400011 - September 29, 1999 - 4.0-CURRENT after the sigset_t - datatype change + 1100050 + December 12, 2014 + 11.0-CURRENT after adding AES-ICM and AES-GCM to + OpenCrypto (rev 275732). - 400012 - November 15, 1999 - 4.0-CURRENT after the cutover to the GCC 2.95.2 - compiler + 1100051 + December 23, 2014 + 11.0-CURRENT after removing old NFS client and server + code from the kernel (rev + 276096). - 400013 - December 4, 1999 - 4.0-CURRENT after adding pluggable linux-mode - ioctl handlers + 1100052 + December 31, 2014 + 11.0-CURRENT after upgrade of clang, llvm and lldb to + 3.5.0 release (rev 276479). - 400014 - January 18, 2000 - 4.0-CURRENT after importing OpenSSL + 1100053 + January 7, 2015 + 11.0-CURRENT after MCLGET() gained a return value + (rev 276750). - 400015 - January 27, 2000 - 4.0-CURRENT after the C++ ABI change in GCC - 2.95.2 from -fvtable-thunks to -fno-vtable-thunks by - default + 1100054 + January 15, 2015 + 11.0-CURRENT after rewrite of callout subsystem + (rev 277213). - 400016 - February 27, 2000 - 4.0-CURRENT after importing OpenSSH + 1100055 + January 22, 2015 + 11.0-CURRENT after reverting callout changes in + r277213 (rev 277528). - 400017 - March 13, 2000 - 4.0-RELEASE + 1100056 + January 23, 2015 + 11.0-CURRENT after addition of + futimens and + utimensat system calls + (rev 277610). + - 400018 - March 17, 2000 - 4.0-STABLE after 4.0-RELEASE + 1100057 + January 29, 2015 + 11.0-CURRENT after removal of d_thread_t + (rev 277897). - 400019 - May 5, 2000 - 4.0-STABLE after the introduction of delayed - checksums. + 1100058 + February 5, 2015 + 11.0-CURRENT after addition of support for probing + the SCSI VPD Extended Inquiry page (0x86) + (rev 278228). - 400020 - June 4, 2000 - 4.0-STABLE after merging libxpg4 code into - libc. + 1100059 + February 9, 2015 + 11.0-CURRENT after import of xz 5.2.0, + which added multi-threaded compression and lzma + gained libthr dependency + (rev 278433). - 400021 - July 8, 2000 - 4.0-STABLE after upgrading Binutils to 2.10.0, - ELF branding changes, and tcsh in the base - system. + 1100060 + February 16, 2015 + 11.0-CURRENT after forwarding + FBIO_BLANK + to framebuffer clients + (rev 278846). - 410000 - July 14, 2000 - 4.1-RELEASE + 1100061 + February 18, 2015 + 11.0-CURRENT after CDAI_FLAG_NONE + addition (rev 278964). - 410001 - July 29, 2000 - 4.1-STABLE after 4.1-RELEASE + 1100062 + February 23, 2015 + 11.0-CURRENT after &man.mtio.4; and &man.sa.4; + API and &man.ioctl.2; additions + (rev 279221). - 410002 - September 16, 2000 - 4.1-STABLE after &man.setproctitle.3; moved from - libutil to libc. + 1100063 + March 7, 2015 + 11.0-CURRENT after adding mutex support to the + pps_ioctl() API in the kernel (rev + 279728). - 411000 - September 25, 2000 - 4.1.1-RELEASE + 1100064 + March 7, 2015 + 11.0-CURRENT after adding PPS support to USB serial + drivers (rev 279729). - 411001 - - 4.1.1-STABLE after 4.1.1-RELEASE + 1100065 + March 15, 2015 + 11.0-CURRENT after upgrading clang, llvm and lldb to + 3.6.0 (rev 280031). - 420000 - October 31, 2000 - 4.2-RELEASE + 1100066 + March 20, 2015 + + 11.0-CURRENT after removal of SSLv2 support from + OpenSSL (rev 280306). - 420001 - January 10, 2001 - 4.2-STABLE after combining libgcc.a and - libgcc_r.a, and associated GCC linkage - changes. + 1100067 + March 25, 2015 + 11.0-CURRENT after removal of SSLv2 support from + &man.fetch.1; and &man.fetch.3; (rev + 280630). - 430000 - March 6, 2001 - 4.3-RELEASE + 1100068 + April 6, 2015 + 11.0-CURRENT after change to net.inet6.ip6.mif6table + sysctl (rev 281172). - 430001 - May 18, 2001 - 4.3-STABLE after wint_t introduction. + 1100069 + April 15, 2015 + 11.0-CURRENT after removal of const qualifier from + &man.iconv.3; (rev 281550). - 430002 - July 22, 2001 - 4.3-STABLE after PCI powerstate API - merge. + 1100071 + April 29, 2015 + 11.0-CURRENT after API/ABI change to + &man.smb.4; (rev 281985). - 440000 - August 1, 2001 - 4.4-RELEASE + 1100072 + May 1, 2015 + 11.0-CURRENT after adding &man.reallocarray.3; in + libc (rev 282314). - 440001 - October 23, 2001 - 4.4-STABLE after d_thread_t introduction. + 1100073 + May 8, 2015 + 11.0-CURRENT after extending the maximum number of + allowed PCM channels in a PCM stream to 127 and decreasing + the maximum number of sub-channels to 1 (rev + 282650). - 440002 - November 4, 2001 - 4.4-STABLE after mount structure changes (affects - filesystem klds). + 1100074 + May 25, 2015 + 11.0-CURRENT after adding preliminary support for + x86-64 Linux binaries (rev 283424), + and upgrading clang and llvm to 3.6.1 (rev + 283526). - 440003 - December 18, 2001 - 4.4-STABLE after the userland components of smbfs - were imported. + 1100075 + May 27, 2015 + 11.0-CURRENT after dounmount() requiring a reference + on the passed struct mount (rev + 283602). *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** From owner-svn-doc-all@freebsd.org Wed Nov 2 22:53:07 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B4FB9C2C9C6; Wed, 2 Nov 2016 22:53:07 +0000 (UTC) (envelope-from mat@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 61CF8199E; Wed, 2 Nov 2016 22:53:07 +0000 (UTC) (envelope-from mat@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2Mr6uV041771; Wed, 2 Nov 2016 22:53:06 GMT (envelope-from mat@FreeBSD.org) Received: (from mat@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2Mr6KF041770; Wed, 2 Nov 2016 22:53:06 GMT (envelope-from mat@FreeBSD.org) Message-Id: <201611022253.uA2Mr6KF041770@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: mat set sender to mat@FreeBSD.org using -f From: Mathieu Arnold Date: Wed, 2 Nov 2016 22:53:06 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49633 - head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Nov 2016 22:53:08 -0000 Author: mat Date: Wed Nov 2 22:53:06 2016 New Revision: 49633 URL: https://svnweb.freebsd.org/changeset/doc/49633 Log: Correct indentation in after the reorganisation. Approved by: wblock Sponsored by: Absolight Differential Revision: https://reviews.freebsd.org/D8362 Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:53:02 2016 (r49632) +++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:53:06 2016 (r49633) @@ -8,8 +8,7 @@ - <literal>__FreeBSD_version</literal> - Values + <literal>__FreeBSD_version</literal> Values Here is a convenient list of __FreeBSD_version values as defined in @@ -17,6480 +16,6454 @@ xlink:href="http://svnweb.FreeBSD.org/base/head/sys/sys/param.h?view=markup">sys/param.h: - &os; 12 versions + &os; 12 Versions -
      - &os; 12 <literal>__FreeBSD_version</literal> Values - - - - - Value - - Date - - Release - - - - - - 1200000 - July 7, 2016 - 12.0-CURRENT - (rev 302409). - - - - 1200004 - August 24, 2016 - 12.0-CURRENT after fixing LC_*_MASK for newlocale(3) and querylocale(3) - (rev 304703). - - - -
      + + &os; 12 <literal>__FreeBSD_version</literal> + Values + + + + + Value + + Date + + Release + + + + + + 1200000 + July 7, 2016 + 12.0-CURRENT (rev + 302409). + + + + 1200004 + August 24, 2016 + 12.0-CURRENT after fixing LC_*_MASK for + newlocale(3) and querylocale(3) (rev + 304703). + + + +
      - &os; 11 versions - - - &os; 11 <literal>__FreeBSD_version</literal> Values + &os; 11 Versions - - - - Value - - Date - - Release - - - - - - 1100000 - October 10, 2013 - 11.0-CURRENT - (rev 256284). - - - - 1100001 - October 19, 2013 - - 11.0-CURRENT after addition of support for "first - boot" rc.d scripts, so ports can make - use of this (rev 256776). - - - - 1100002 - November 5, 2013 - - 11.0-CURRENT after dropping support for historic - ioctls (rev 257696). - - - - 1100003 - November 17, 2013 - 11.0-CURRENT after iconv changes - (rev 258284). - - - - 1100004 - December 15, 2013 - 11.0-CURRENT after the behavior change of - gss_pseudo_random introduced in - r259286 (rev 259424). - - - - 1100005 - December 28, 2013 - - 11.0-CURRENT after r259951 - Do not coalesce entries - in vm_map_stack() (rev - 260010). - - - - 1100006 - January 28, 2014 - 11.0-CURRENT after upgrades of libelf and libdwarf - (rev 261246). - - - - 1100007 - January 30, 2014 - 11.0-CURRENT after upgrade of libc++ to 3.4 release - (rev 261283). - - - - 1100008 - February 14, 2014 - 11.0-CURRENT after libc++ 3.4 ABI compatibility fix - (rev 261801). - - - - 1100009 - February 16, 2014 - 11.0-CURRENT after upgrade of llvm/clang to 3.4 - release (rev 261991). - - - - 1100010 - February 28, 2014 - 11.0-CURRENT after upgrade of ncurses to 5.9 release - (rev 262629). - - - - 1100011 - March 13, 2014 - 11.0-CURRENT after ABI change in struct if_data - (rev 263102). - - - - 1100012 - March 14, 2014 - 11.0-CURRENT after removal of Novell IPX protocol - support (rev 263140). - - - - 1100013 - March 14, 2014 - 11.0-CURRENT after removal of AppleTalk protocol - support (rev 263152). - - - - 1100014 - March 16, 2014 - 11.0-CURRENT after renaming - <sys/capability.h> to - <sys/capsicum.h> to avoid a - clash with similarly named headers in other operating - systems. A compatibility header is left in place to limit - build breakage, but will be deprecated in due course - (rev 263235). - - - - 1100015 - March 22, 2014 - 11.0-CURRENT after cnt rename to - vm_cnt (rev - 263620). - - - - 1100016 - March 23, 2014 - 11.0-CURRENT after addition of - armv6hf TARGET_ARCH - (rev 263660). - - - - 1100017 - April 4, 2014 - 11.0-CURRENT after GCC support for - __block definition (rev - 264121). - - - - 1100018 - April 6, 2014 - 11.0-CURRENT after support for UDP-Lite protocol (RFC - 3828) (rev 264212). - - - - 1100019 - April 8, 2014 - 11.0-CURRENT after FreeBSD-SA-14:06.openssl (rev - 264265). - - - - 1100020 - May 1, 2014 - 11.0-CURRENT after removing lindev in favor of having - /dev/full by default (rev - 265212). - - - - 1100021 - May 6, 2014 - 11.0-CURRENT after src.opts.mk - changes, decoupling &man.make.conf.5; from - buildworld (rev - 265419). - - - - 1100022 - May 30, 2014 - 11.0-CURRENT after changes to &man.strcasecmp.3;, - moving strcasecmp_l() and - strncasecmp_l() from - <string.h> to - <strings.h> for POSIX 2008 - compliance (rev 266865). - - - - 1100023 - June 13, 2014 - 11.0-CURRENT after the CUSE library and kernel module - have been attached to the build by default (rev - 267440). - - - - 1100024 - June 27, 2014 - 11.0-CURRENT after &man.sysctl.3; - API change (rev - 267992). - - - - 1100025 - June 30, 2014 - 11.0-CURRENT after &man.regex.3; library update - to add > and < - delimiters (rev 268066). - - - - 1100026 - July 1, 2014 - 11.0-CURRENT after the internal interface between the - NFS modules, including the krpc, was changed by (rev - 268115). - - - - 1100027 - July 8, 2014 - 11.0-CURRENT after FreeBSD-SA-14:17.kmem - (rev 268431). - - - - 1100028 - July 21, 2014 - 11.0-CURRENT after hdestroy() - compliance fix changed ABI (rev - 268945). - - - - 1100029 - August 3, 2014 - 11.0-CURRENT after SOCK_DGRAM - bug fix (rev 269489). - - - - 1100030 - September 1, 2014 - 11.0-CURRENT after SOCK_RAW - sockets were changed to not modify packets at all (rev - 270929). - - - - 1100031 - September 9, 2014 - 11.0-CURRENT after FreeBSD-SA-14:18.openssl - (rev 269686). - - - - 1100032 - September 11, 2014 - 11.0-CURRENT after API changes to - ifa_ifwithbroadaddr, - ifa_ifwithdstaddr, - ifa_ifwithnet, and - ifa_ifwithroute (rev - 271438). - - - - 1100033 - September 9, 2014 - 11.0-CURRENT after changing - access, eaccess, and - faccessat to validate the mode argument - (rev 271657). - - - - 1100034 - September 16, 2014 - 11.0-CURRENT after FreeBSD-SA-14:19.tcp - (rev 271666). - - - - 1100035 - September 17, 2014 - 11.0-CURRENT after i915 HW context support - (rev 271705). - - - - 1100036 - September 17, 2014 - Version bump to have ABI note distinguish binaries - ready for strict &man.mmap.2; flags checking - (rev 271724). - - - - 1100037 - October 6, 2014 - 11.0-CURRENT after addition of - &man.explicit.bzero.3; (rev - 272673). - - - - 1100038 - October 11, 2014 - 11.0-CURRENT after cleanup of TCP wrapper headers - (rev 272951). - - - - 1100039 - October 18, 2014 - 11.0-CURRENT after removal of - MAP_RENAME and - MAP_NORESERVE (rev - 273250). - - - - 1100040 - October 21, 2014 - 11.0-CURRENT after FreeBSD-SA-14:23 (rev - 273146). - - - - 1100041 - October 30, 2014 - 11.0-CURRENT after API changes to - syscall_register, - syscall32_register, - syscall_register_helper and - syscall32_register_helper (rev - 273707). - - - - 1100042 - November 3, 2014 - 11.0-CURRENT after a change to struct - tcpcb (rev - 274046). - - - - 1100043 - November 4, 2014 - 11.0-CURRENT after enabling &man.vt.4; by default - (rev 274085). - - - - 1100044 - November 4, 2014 - 11.0-CURRENT after adding new libraries/utilities - (dpv and figpar) for data throughput visualization (rev - 274116). - - - - 1100045 - November 4, 2014 - 11.0-CURRENT after FreeBSD-SA-14:23, - FreeBSD-SA-14:24, and FreeBSD-SA-14:25 (rev - 274162). - - - - 1100046 - November 13, 2014 - 11.0-CURRENT after kern_poll - signature change (rev - 274462). - - - - 1100047 - November 13, 2014 - 11.0-CURRENT after removal of no-at version - of VFS syscalls helpers, like kern_open - (rev 274476). - - - - 1100048 - December 1, 2014 - 11.0-CURRENT after starting the process of removing - the use of the deprecated "M_FLOWID" flag from the network - code (rev 275358). - - - - 1100049 - December 9, 2014 - 11.0-CURRENT after importing an important fix to the - LLVM vectorizer, which could lead to buffer overruns in - some cases (rev 275633). - - - - 1100050 - December 12, 2014 - 11.0-CURRENT after adding AES-ICM and AES-GCM to - OpenCrypto (rev 275732). - - - - 1100051 - December 23, 2014 - 11.0-CURRENT after removing old NFS client and server - code from the kernel (rev - 276096). - - - - 1100052 - December 31, 2014 - 11.0-CURRENT after upgrade of clang, llvm and lldb to - 3.5.0 release (rev 276479). - - - - 1100053 - January 7, 2015 - 11.0-CURRENT after MCLGET() gained a return value - (rev 276750). - - - - 1100054 - January 15, 2015 - 11.0-CURRENT after rewrite of callout subsystem - (rev 277213). - - - - 1100055 - January 22, 2015 - 11.0-CURRENT after reverting callout changes in - r277213 (rev 277528). - - - - 1100056 - January 23, 2015 - 11.0-CURRENT after addition of - futimens and - utimensat system calls - (rev 277610). - - - - - 1100057 - January 29, 2015 - 11.0-CURRENT after removal of d_thread_t - (rev 277897). - - - - 1100058 - February 5, 2015 - 11.0-CURRENT after addition of support for probing - the SCSI VPD Extended Inquiry page (0x86) - (rev 278228). - - - - 1100059 - February 9, 2015 - 11.0-CURRENT after import of xz 5.2.0, - which added multi-threaded compression and lzma - gained libthr dependency - (rev 278433). - - - - 1100060 - February 16, 2015 - 11.0-CURRENT after forwarding - FBIO_BLANK - to framebuffer clients - (rev 278846). - - - - 1100061 - February 18, 2015 - 11.0-CURRENT after CDAI_FLAG_NONE - addition (rev 278964). - - - - 1100062 - February 23, 2015 - 11.0-CURRENT after &man.mtio.4; and &man.sa.4; - API and &man.ioctl.2; additions - (rev 279221). - - - - 1100063 - March 7, 2015 - 11.0-CURRENT after adding mutex support to the - pps_ioctl() API in the kernel (rev - 279728). - - - - 1100064 - March 7, 2015 - 11.0-CURRENT after adding PPS support to USB serial - drivers (rev 279729). - - - - 1100065 - March 15, 2015 - 11.0-CURRENT after upgrading clang, llvm and lldb to - 3.6.0 (rev 280031). - - - - 1100066 - March 20, 2015 - - 11.0-CURRENT after removal of SSLv2 support from - OpenSSL (rev 280306). - - - - 1100067 - March 25, 2015 - 11.0-CURRENT after removal of SSLv2 support from - &man.fetch.1; and &man.fetch.3; (rev - 280630). - - - - 1100068 - April 6, 2015 - 11.0-CURRENT after change to net.inet6.ip6.mif6table - sysctl (rev 281172). - - - - 1100069 - April 15, 2015 - 11.0-CURRENT after removal of const qualifier from - &man.iconv.3; (rev 281550). - - - - 1100071 - April 29, 2015 - 11.0-CURRENT after API/ABI change to - &man.smb.4; (rev 281985). - - - - 1100072 - May 1, 2015 - 11.0-CURRENT after adding &man.reallocarray.3; in - libc (rev 282314). - - - - 1100073 - May 8, 2015 - 11.0-CURRENT after extending the maximum number of - allowed PCM channels in a PCM stream to 127 and decreasing - the maximum number of sub-channels to 1 (rev - 282650). - - - - 1100074 - May 25, 2015 - 11.0-CURRENT after adding preliminary support for - x86-64 Linux binaries (rev 283424), - and upgrading clang and llvm to 3.6.1 (rev - 283526). - - - - 1100075 - May 27, 2015 - 11.0-CURRENT after dounmount() requiring a reference - on the passed struct mount (rev - 283602). - - - - 1100076 - June 4, 2015 - 11.0-CURRENT after disabled generation of legacy - formatted password databases entries by default. (rev - 283983). - - - - 1100077 - June 10, 2015 - 11.0-CURRENT after API changes to - lim_cur, - lim_max, and - lim_rlimit (rev - 284215). - - - - 1100079 - August 18, 2015 - 11.0-CURRENT after import of jemalloc 4.0.0 - (rev 286866). - - - - 1100080 - October 5, 2015 - 11.0-CURRENT after upgrading clang, llvm, lldb, - compiler-rt and libc++ to 3.7.0 (rev - 288943). - - - - 1100081 - October 16, 2015 - 11.0-CURRENT after undating ZFS to support resumable - send/receive (rev r289362). - - - - 1100085 - October 30, 2015 - 11.0-CURRENT after import of OpenSSL 1.0.2d (rev - 290207). - - - - 1100088 - November 7, 2015 - 11.0-CURRENT after string collation and locales - rework (rev 290495). - - - - 1100089 - November 7, 2015 - 11.0-CURRENT after API change to - &man.sysctl.add.oid.9; (rev 290475 - and r290505). - - - - 1100090 - November 10, 2015 - 11.0-CURRENT after API change to callout_stop macro; - (rev 290664). - - - - 1100092 - December 19, 2015 - 11.0-CURRENT after removal of vm_pageout_grow_cache - (rev 292469). - - - - 1100093 - December 30, 2015 - 11.0-CURRENT after removal of sys/crypto/sha2.h - (rev 292782). - - - - 1100094 - January 15, 2016 - 11.0-CURRENT after LinuxKPI PCI changes - (rev 294086). - - - - 1100095 - January 19, 2016 - 11.0-CURRENT after LRO optimizations - (rev 294327). - - - - 1100096 - January 21, 2016 - 11.0-CURRENT after LinuxKPI idr_* additions - (rev 294505). - - - - 1100097 - January 26, 2016 - 11.0-CURRENT after API change to dpv(3) - (rev 294860). - - - - 1100098 - February 16, 2016 - 11.0-CURRENT after API change to rman - (rev 294883). - - - - 1100100 - February 26, 2016 - 11.0-CURRENT after bus_alloc_resource_anywhere() API - addition (rev 296136). - - - - 1100116 - May 31, 2016 - 11.0-CURRENT after SHA-512t256 (rev - 300903) and Skein (rev - 300966) where added to - libmd, libcrypt, the kernel, and ZFS (rev - 301010). - - - - 1100117 - June 6, 2016 - 11.0-CURRENT after libpam was synced with stock - 301602, bumping library version. - - - - 1100118 - June 21, 2016 - 11.0-CURRENT after breaking binary compatibility of struct disk - 302069. - - - - 1100119 - June 23, 2016 - 11.0-CURRENT after switching geom_disk to using a pool mutex - 302150. - - - - 1100120 - June 23, 2016 - 11.0-CURRENT after adding spares to struct ifnet - 302153. - - - - 1100500 - August 12, 2016 - 11.0-STABLE adding branched - 303976. - - - - 1100121 - August 12, 2015 - 11-STABLE after releng/11.0 - branched from 11-STABLE (rev - 303975). - - - -
      + + &os; 11 <literal>__FreeBSD_version</literal> + Values + + + + + Value + + Date + + Release + + + + + + 1100000 + October 10, 2013 + 11.0-CURRENT (rev + 256284). + + + + 1100001 + October 19, 2013 + + 11.0-CURRENT after addition of support for "first + boot" rc.d scripts, so ports can + make use of this (rev + 256776). + + + + 1100002 + November 5, 2013 + + 11.0-CURRENT after dropping support for historic + ioctls (rev 257696). + + + + 1100003 + November 17, 2013 + 11.0-CURRENT after iconv changes (rev + 258284). + + + + 1100004 + December 15, 2013 + 11.0-CURRENT after the behavior change of + gss_pseudo_random introduced in + r259286 (rev 259424). + + + + 1100005 + December 28, 2013 + + 11.0-CURRENT after r259951 - Do not coalesce + entries in vm_map_stack() (rev + 260010). + + + + 1100006 + January 28, 2014 + 11.0-CURRENT after upgrades of libelf and libdwarf + (rev 261246). + + + + 1100007 + January 30, 2014 + 11.0-CURRENT after upgrade of libc++ to 3.4 release + (rev 261283). + + + + 1100008 + February 14, 2014 + 11.0-CURRENT after libc++ 3.4 ABI compatibility fix + (rev 261801). + + + + 1100009 + February 16, 2014 + 11.0-CURRENT after upgrade of llvm/clang to 3.4 + release (rev 261991). + + + + 1100010 + February 28, 2014 + 11.0-CURRENT after upgrade of ncurses to 5.9 + release (rev 262629). + + + + 1100011 + March 13, 2014 + 11.0-CURRENT after ABI change in struct if_data + (rev 263102). + + + + 1100012 + March 14, 2014 + 11.0-CURRENT after removal of Novell IPX protocol + support (rev 263140). + + + + 1100013 + March 14, 2014 + 11.0-CURRENT after removal of AppleTalk protocol + support (rev 263152). + + + + 1100014 + March 16, 2014 + 11.0-CURRENT after renaming *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** From owner-svn-doc-all@freebsd.org Thu Nov 3 09:58:19 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 23353C2C469; Thu, 3 Nov 2016 09:58:19 +0000 (UTC) (envelope-from rcyu@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id DC0FD1332; Thu, 3 Nov 2016 09:58:18 +0000 (UTC) (envelope-from rcyu@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA39wIq8000412; Thu, 3 Nov 2016 09:58:18 GMT (envelope-from rcyu@FreeBSD.org) Received: (from rcyu@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA39wIBi000411; Thu, 3 Nov 2016 09:58:18 GMT (envelope-from rcyu@FreeBSD.org) Message-Id: <201611030958.uA39wIBi000411@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rcyu set sender to rcyu@FreeBSD.org using -f From: Ruey-Cherng Yu Date: Thu, 3 Nov 2016 09:58:18 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49634 - head/zh_TW.UTF-8/share/xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 03 Nov 2016 09:58:19 -0000 Author: rcyu Date: Thu Nov 3 09:58:17 2016 New Revision: 49634 URL: https://svnweb.freebsd.org/changeset/doc/49634 Log: Update and translate the navigation bar Approved by: kevlo(mentor) Modified: head/zh_TW.UTF-8/share/xml/header.l10n.ent Modified: head/zh_TW.UTF-8/share/xml/header.l10n.ent ============================================================================== --- head/zh_TW.UTF-8/share/xml/header.l10n.ent Wed Nov 2 22:53:06 2016 (r49633) +++ head/zh_TW.UTF-8/share/xml/header.l10n.ent Thu Nov 3 09:58:17 2016 (r49634) @@ -21,19 +21,83 @@ -
        -
      • 首頁
      • -
      • 關於
      • -
      • 取得 FreeBSD
      • -
      • 文件
      • -
      • 社群
      • -
      • 開發
      • -
      • 支援
      • -
      • 基金會
      • + -'> + + + + + + + + + '> Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D4491C2D9C4; Thu, 3 Nov 2016 15:41:43 +0000 (UTC) (envelope-from rcyu@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 839D71BC7; Thu, 3 Nov 2016 15:41:43 +0000 (UTC) (envelope-from rcyu@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA3Ffg0V034311; Thu, 3 Nov 2016 15:41:42 GMT (envelope-from rcyu@FreeBSD.org) Received: (from rcyu@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA3Ffgch034310; Thu, 3 Nov 2016 15:41:42 GMT (envelope-from rcyu@FreeBSD.org) Message-Id: <201611031541.uA3Ffgch034310@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rcyu set sender to rcyu@FreeBSD.org using -f From: Ruey-Cherng Yu Date: Thu, 3 Nov 2016 15:41:42 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49635 - head/zh_TW.UTF-8/htdocs X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 03 Nov 2016 15:41:44 -0000 Author: rcyu Date: Thu Nov 3 15:41:42 2016 New Revision: 49635 URL: https://svnweb.freebsd.org/changeset/doc/49635 Log: - Update some links to &enbase - update translation Approved by: kevlo(mentor) Modified: head/zh_TW.UTF-8/htdocs/index.xsl Modified: head/zh_TW.UTF-8/htdocs/index.xsl ============================================================================== --- head/zh_TW.UTF-8/htdocs/index.xsl Thu Nov 3 09:58:17 2016 (r49634) +++ head/zh_TW.UTF-8/htdocs/index.xsl Thu Nov 3 15:41:42 2016 (r49635) @@ -36,16 +36,16 @@
        -

        The &os; Project

        +

        &os; 計劃

        -

        &os; 是一個使用於現代伺服器,桌面與嵌入式平台 platforms 的先進作業系統。 +

        &os; 是一個使用於現代伺服器,桌面與嵌入式 平台 的先進作業系統。 由一群龐大的 社群 + href="&enbase;/doc/en_US.ISO8859-1/articles/contributors/staff-committers.html">社群 持續超過三十年的開發。 由於它先進的網路、安全性與儲存方面的特色使得 &os; 成為許多 - 大規模網站 + 大型網站 以及最普遍的嵌入式網路與儲存裝置的平台選擇。

        常用連結 @@ -223,7 +223,7 @@ 更多新聞
      • - News RSS Feed + 新聞 RSS Feed
      @@ -246,7 +246,7 @@ @@ -269,7 +269,7 @@ @@ -292,10 +292,10 @@
      @@ -313,10 +313,10 @@
      @@ -338,6 +338,6 @@ FreeBSD 標誌是 FreeBSD 基金會的註冊商標 由 FreeBSD 基金會 授權 FreeBSD 計劃使用。 - &header2.word.contact; + &header2.word.contact; From owner-svn-doc-all@freebsd.org Thu Nov 3 18:34:21 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5ED32C2E444; Thu, 3 Nov 2016 18:34:21 +0000 (UTC) (envelope-from emaste@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 13F991BE8; Thu, 3 Nov 2016 18:34:21 +0000 (UTC) (envelope-from emaste@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA3IYKPj005163; Thu, 3 Nov 2016 18:34:20 GMT (envelope-from emaste@FreeBSD.org) Received: (from emaste@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA3IYKgp005162; Thu, 3 Nov 2016 18:34:20 GMT (envelope-from emaste@FreeBSD.org) Message-Id: <201611031834.uA3IYKgp005162@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: emaste set sender to emaste@FreeBSD.org using -f From: Ed Maste Date: Thu, 3 Nov 2016 18:34:20 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49636 - head/en_US.ISO8859-1/htdocs/news/status X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 03 Nov 2016 18:34:21 -0000 Author: emaste (src committer) Date: Thu Nov 3 18:34:20 2016 New Revision: 49636 URL: https://svnweb.freebsd.org/changeset/doc/49636 Log: Update/clarify core@ licensing issues for the quarter Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 15:41:42 2016 (r49635) +++ head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 18:34:20 2016 (r49636) @@ -1302,25 +1302,23 @@
      • Importing Concurrency Kit. In consultation with the - Foundation's legal counsel, it was determined that the - relevant patents on the 'Read Copy Update' synchronization - mechanisms have expired, and consequently the import of - selected parts of concurrency kit was approved.
      • + Foundation's legal counsel, it was determined that + importing selected parts of concurrency kit is acceptable, + and has been approved.
      • The proposal to create a shadow GPLv3 toolchain repository was put to the community. Ultimately the whole idea has been rendered largely redundant by faster than anticipated - progress at integrating the latest LLVM toolchain on most of - the interesting system architectures. The goal of a - GPL-free base system is within our grasp.
      • - -
      • Reports that GPL code has been pasted into linuxkpi - sources are under investigation. Core would like to stress - that great care must be taken to avoid inadvertent license - infringement, especially when implementing hardware - interfaces or similar where there is limited scope to invent - new constants or otherwise make it clear this is a novel - implementation.
      • + progress on the external toolchain ports and packages for + those architectures where LLVM is not yet sufficieintly + mature. + +
      • Concerns were raised about handling GPL code in work in + progress on the linuxkpi shim. This issue is not related to + the FreeBSD svn repository but Core would like to stress + that care must be taken to avoid license infringement and + plans to write a set of guidelines for handling GPL + code.

      Work on LLVM has thrown up problems with the presence of From owner-svn-doc-all@freebsd.org Thu Nov 3 18:46:16 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2952EC2E784; Thu, 3 Nov 2016 18:46:16 +0000 (UTC) (envelope-from emaste@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id ECA0B1111; Thu, 3 Nov 2016 18:46:15 +0000 (UTC) (envelope-from emaste@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA3IkFke009097; Thu, 3 Nov 2016 18:46:15 GMT (envelope-from emaste@FreeBSD.org) Received: (from emaste@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA3IkFDR009096; Thu, 3 Nov 2016 18:46:15 GMT (envelope-from emaste@FreeBSD.org) Message-Id: <201611031846.uA3IkFDR009096@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: emaste set sender to emaste@FreeBSD.org using -f From: Ed Maste Date: Thu, 3 Nov 2016 18:46:15 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49637 - head/en_US.ISO8859-1/htdocs/news/status X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 03 Nov 2016 18:46:16 -0000 Author: emaste (src committer) Date: Thu Nov 3 18:46:14 2016 New Revision: 49637 URL: https://svnweb.freebsd.org/changeset/doc/49637 Log: Correct typo introduced in r49636 Submitted by: bcr Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 18:34:20 2016 (r49636) +++ head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 18:46:14 2016 (r49637) @@ -1310,7 +1310,7 @@ was put to the community. Ultimately the whole idea has been rendered largely redundant by faster than anticipated progress on the external toolchain ports and packages for - those architectures where LLVM is not yet sufficieintly + those architectures where LLVM is not yet sufficiently mature.

    • Concerns were raised about handling GPL code in work in From owner-svn-doc-all@freebsd.org Thu Nov 3 19:22:39 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1E60DC2D64D; Thu, 3 Nov 2016 19:22:39 +0000 (UTC) (envelope-from emaste@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E0C4B12B7; Thu, 3 Nov 2016 19:22:38 +0000 (UTC) (envelope-from emaste@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA3JMcXD024493; Thu, 3 Nov 2016 19:22:38 GMT (envelope-from emaste@FreeBSD.org) Received: (from emaste@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA3JMcPT024492; Thu, 3 Nov 2016 19:22:38 GMT (envelope-from emaste@FreeBSD.org) Message-Id: <201611031922.uA3JMcPT024492@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: emaste set sender to emaste@FreeBSD.org using -f From: Ed Maste Date: Thu, 3 Nov 2016 19:22:38 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49638 - head/en_US.ISO8859-1/htdocs/news/status X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 03 Nov 2016 19:22:39 -0000 Author: emaste (src committer) Date: Thu Nov 3 19:22:37 2016 New Revision: 49638 URL: https://svnweb.freebsd.org/changeset/doc/49638 Log: Remove an incomplete core topic Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 18:46:14 2016 (r49637) +++ head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 19:22:37 2016 (r49638) @@ -1321,13 +1321,6 @@ code.
    • -

      Work on LLVM has thrown up problems with the presence of - certain pre-compiled binary-only drivers as part of the - GENERIC kernel. Core has adopted the policy that such - binary-only code should be moved to loadable modules and that - the GENERIC kernel must be compiled entirely from original - sources.

      -

      The item that has absorbed the largest portion of Core's attention this quarter concerns the project's handling of security vulnerabilities in bspatch(1), From owner-svn-doc-all@freebsd.org Thu Nov 3 19:41:55 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 66AA8C2DB84; Thu, 3 Nov 2016 19:41:55 +0000 (UTC) (envelope-from sevan@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 2F2411D05; Thu, 3 Nov 2016 19:41:55 +0000 (UTC) (envelope-from sevan@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA3Jfstj028587; Thu, 3 Nov 2016 19:41:54 GMT (envelope-from sevan@FreeBSD.org) Received: (from sevan@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA3JfsZX028586; Thu, 3 Nov 2016 19:41:54 GMT (envelope-from sevan@FreeBSD.org) Message-Id: <201611031941.uA3JfsZX028586@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: sevan set sender to sevan@FreeBSD.org using -f From: Sevan Janiyan Date: Thu, 3 Nov 2016 19:41:54 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49639 - head/en_US.ISO8859-1/books/handbook/advanced-networking X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 03 Nov 2016 19:41:55 -0000 Author: sevan Date: Thu Nov 3 19:41:54 2016 New Revision: 49639 URL: https://svnweb.freebsd.org/changeset/doc/49639 Log: Use the correct variable name & command to setup the gif tunnel endpoints. PR: 214153 Submitted by: John W. O'Brien Approved by: bcr (mentor) Differential Revision: https://reviews.freebsd.org/D8427 Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Thu Nov 3 19:22:37 2016 (r49638) +++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Thu Nov 3 19:41:54 2016 (r49639) @@ -4672,7 +4672,7 @@ rtsold_enable="YES" and REMOTE_IPv4_ADDR with the actual IPv4 addresses: - cloned_interfaces_gif0="MY_IPv4_ADDR REMOTE_IPv4_ADDR" + create_args_gif0="tunnel MY_IPv4_ADDR REMOTE_IPv4_ADDR" To apply the IPv6 address that has been assigned for use as the IPv6 tunnel From owner-svn-doc-all@freebsd.org Thu Nov 3 19:48:37 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 39AE3C2DE1E; Thu, 3 Nov 2016 19:48:37 +0000 (UTC) (envelope-from sevan@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 08E601024; Thu, 3 Nov 2016 19:48:36 +0000 (UTC) (envelope-from sevan@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA3JmaY4032541; Thu, 3 Nov 2016 19:48:36 GMT (envelope-from sevan@FreeBSD.org) Received: (from sevan@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA3Jmawj032540; Thu, 3 Nov 2016 19:48:36 GMT (envelope-from sevan@FreeBSD.org) Message-Id: <201611031948.uA3Jmawj032540@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: sevan set sender to sevan@FreeBSD.org using -f From: Sevan Janiyan Date: Thu, 3 Nov 2016 19:48:36 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49640 - head/en_US.ISO8859-1/books/handbook/advanced-networking X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 03 Nov 2016 19:48:37 -0000 Author: sevan Date: Thu Nov 3 19:48:36 2016 New Revision: 49640 URL: https://svnweb.freebsd.org/changeset/doc/49640 Log: Fix spelling mistakes picked up by igor. Approved by: bcr (mentor) Differential Revision: https://reviews.freebsd.org/D8428 Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Thu Nov 3 19:41:54 2016 (r49639) +++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Thu Nov 3 19:48:36 2016 (r49640) @@ -3231,7 +3231,7 @@ bridge0: flags=8843<UP,BROADCAST,RUNN address is seen on a different interface. This gives the benefit of static address entries without the need to pre-populate the forwarding table. Clients learned - on a particular segment of the bridge can not roam to + on a particular segment of the bridge cannot roam to another segment. An example of using sticky addresses is to combine @@ -3251,7 +3251,7 @@ bridge0: flags=8843<UP,BROADCAST,RUNN In this example, both clients see 192.168.0.1 as their default gateway. Since the bridge cache is sticky, one - host can not spoof the MAC address of + host cannot spoof the MAC address of the other customer in order to intercept their traffic. From owner-svn-doc-all@freebsd.org Fri Nov 4 12:49:23 2016 Return-Path: Delivered-To: svn-doc-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F3E03C2F491; Fri, 4 Nov 2016 12:49:22 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C1EF6D35; Fri, 4 Nov 2016 12:49:22 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA4CnMEO029822; Fri, 4 Nov 2016 12:49:22 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA4CnMHg029821; Fri, 4 Nov 2016 12:49:22 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201611041249.uA4CnMHg029821@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Fri, 4 Nov 2016 12:49:21 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49641 - head/ja_JP.eucJP/books/handbook/introduction X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 04 Nov 2016 12:49:23 -0000 Author: ryusuke Date: Fri Nov 4 12:49:21 2016 New Revision: 49641 URL: https://svnweb.freebsd.org/changeset/doc/49641 Log: - Merge the following from the English version: r48529 -> r49507 head/ja_JP.eucJP/books/handbook/introduction/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/introduction/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/introduction/chapter.xml ============================================================================== --- head/ja_JP.eucJP/books/handbook/introduction/chapter.xml Thu Nov 3 19:48:36 2016 (r49640) +++ head/ja_JP.eucJP/books/handbook/introduction/chapter.xml Fri Nov 4 12:49:21 2016 (r49641) @@ -3,7 +3,7 @@ The FreeBSD Documentation Project The FreeBSD Japanese Documentation Project - Original revision: r48529 + Original revision: r49507 $FreeBSD$ --> @@ -612,6 +612,18 @@ + Stormshield + + Stormshield + + - Stormshield ͥåȥƥץ饤 + ϡ줿 &os; ١Ǥ + BSD 饤󥹤ˤꡢƥ˲桹Ū⻺Ǥǡ + ߥ˥ƥ¿ζ̣ȯ̤⤿餷Ƥޤ + + + The Weather Channel