From owner-svn-doc-all@freebsd.org Wed Jul 24 13:28:54 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9C989A8305; Wed, 24 Jul 2019 13:28:54 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 8797582BAF; Wed, 24 Jul 2019 13:28:54 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 622B5EFC8; Wed, 24 Jul 2019 13:28:54 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6ODSsaX094567; Wed, 24 Jul 2019 13:28:54 GMT (envelope-from gordon@FreeBSD.org) Received: (from gordon@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6ODSqWb094555; Wed, 24 Jul 2019 13:28:52 GMT (envelope-from gordon@FreeBSD.org) Message-Id: <201907241328.x6ODSqWb094555@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gordon set sender to gordon@FreeBSD.org using -f From: Gordon Tetlow Date: Wed, 24 Jul 2019 13:28:52 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53269 - in head/share: security/advisories security/patches/EN-19:13 security/patches/SA-19:12 security/patches/SA-19:13 security/patches/SA-19:14 security/patches/SA-19:15 security/pa... X-SVN-Group: doc-head X-SVN-Commit-Author: gordon X-SVN-Commit-Paths: in head/share: security/advisories security/patches/EN-19:13 security/patches/SA-19:12 security/patches/SA-19:13 security/patches/SA-19:14 security/patches/SA-19:15 security/patches/SA-19:16 security/... X-SVN-Commit-Revision: 53269 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 8797582BAF X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.97 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.97)[-0.967,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Jul 2019 13:28:54 -0000 Author: gordon (src committer) Date: Wed Jul 24 13:28:52 2019 New Revision: 53269 URL: https://svnweb.freebsd.org/changeset/doc/53269 Log: Add EN-19:13 and SA-19:12 to SA-19:17. Approved by: so Added: head/share/security/advisories/FreeBSD-EN-19:13.mds.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:12.telnet.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:13.pts.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:14.freebsd32.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:15.mqueuefs.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:16.bhyve.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:17.fd.asc (contents, props changed) head/share/security/patches/EN-19:13/ head/share/security/patches/EN-19:13/mds.11.patch (contents, props changed) head/share/security/patches/EN-19:13/mds.11.patch.asc (contents, props changed) head/share/security/patches/EN-19:13/mds.12.patch (contents, props changed) head/share/security/patches/EN-19:13/mds.12.patch.asc (contents, props changed) head/share/security/patches/SA-19:12/ head/share/security/patches/SA-19:12/telnet.patch (contents, props changed) head/share/security/patches/SA-19:12/telnet.patch.asc (contents, props changed) head/share/security/patches/SA-19:13/ head/share/security/patches/SA-19:13/pts.patch (contents, props changed) head/share/security/patches/SA-19:13/pts.patch.asc (contents, props changed) head/share/security/patches/SA-19:14/ head/share/security/patches/SA-19:14/freebsd32.patch (contents, props changed) head/share/security/patches/SA-19:14/freebsd32.patch.asc (contents, props changed) head/share/security/patches/SA-19:15/ head/share/security/patches/SA-19:15/mqueuefs.patch (contents, props changed) head/share/security/patches/SA-19:15/mqueuefs.patch.asc (contents, props changed) head/share/security/patches/SA-19:16/ head/share/security/patches/SA-19:16/bhyve.patch (contents, props changed) head/share/security/patches/SA-19:16/bhyve.patch.asc (contents, props changed) head/share/security/patches/SA-19:17/ head/share/security/patches/SA-19:17/fd.11.2.patch (contents, props changed) head/share/security/patches/SA-19:17/fd.11.2.patch.asc (contents, props changed) head/share/security/patches/SA-19:17/fd.11.patch (contents, props changed) head/share/security/patches/SA-19:17/fd.11.patch.asc (contents, props changed) head/share/security/patches/SA-19:17/fd.12.patch (contents, props changed) head/share/security/patches/SA-19:17/fd.12.patch.asc (contents, props changed) Modified: head/share/xml/advisories.xml head/share/xml/notices.xml Added: head/share/security/advisories/FreeBSD-EN-19:13.mds.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-19:13.mds.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,133 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-19:13.mds Errata Notice + The FreeBSD Project + +Topic: Kernel panic from Intel CPU vulnerability mitigation + +Category: core +Module: kernel +Announced: 2019-07-24 +Credits: Schuendehuette, Matthias + All supported versions of FreeBSD. +Corrected: 2019-07-14 05:40:03 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:50:46 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-14 05:41:43 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:50:46 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:50:46 UTC (releng/11.3, 11.3-RELEASE-p1) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +In a previous update FreeBSD added mitigations for an Intel CPU +vulnerability known as "microarchitectural data sampling." + +II. Problem Description + +Under certain configurations a pointer to the mitigation routine may be +dereferenced before it is initialized. + +III. Impact + +Depending on system configuration, version, and architecture, the system +may panic early in boot process, and thus be unusable. + +IV. Workaround + +No workaround is available. + +V. Solution + +Perform one of the following: + +1) Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date, and reboot. + +2) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Errata update" + +3) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 11.2, FreeBSD 11.3] +# fetch https://security.FreeBSD.org/patches/EN-19:13/mds.11.patch +# fetch https://security.FreeBSD.org/patches/EN-19:13/mds.11.patch.asc +# gpg --verify mds.11.patch.asc + +[FreeBSD 12.0] +# fetch https://security.FreeBSD.org/patches/EN-19:13/mds.12.patch +# fetch https://security.FreeBSD.org/patches/EN-19:13/mds.12.patch.asc +# gpg --verify mds.12.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r349983 +releng/12.0/ r350280 +stable/11/ r349985 +releng/11.2/ r350280 +releng/11.3/ r350280 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WkVfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIkZA//ZbeSb2yAsux4w/nOLXQI1kfNWFT3LjVsiYS0VXCoixHr07nkDNMUv2Pn +08eP+9hy5mtgtooOjxP/aYIzR11+HZKpS/MG1x8KGAA/0TWY4EObJUTQ53UHY5+i +WStyHgKvqgeV2vuTqtjK5eAJfaTQV9huoapcQo0ngJMlbzICxN37UBZhOnSGb5HL +vRAL1AnI37LBWeZJhp3nyNatUjYfaL/HBYVpmuO9g+lgXqcFRpgIZxTNSzpDsAUb +7ARtHNUOelUoeMcMQXHbYtNOpM9c84fWxLftNsVfD3d9+GiHpklU2B++aBfzbTl3 +3lgRRk1p1p0JUNXCJy/cPb6/4SqnQRHehu1pwnJnuOM4PBpLB5HRD4WWGzM2A4Jq +SB1rLKCwfeSWPDQ0/iOs6P+UPFjqV8WvbNmQQT+oZxZH7YSm2TY9EGd8V/3wxzYo ++FeVQ+KTW+qxXTKHnNS9KGD26Xseq8S7Ft4dzIjm6hZVwSwNPBQFnPptv4b42/sQ +1sJxjKwKb7CrJJl4uf7vlIyNRHu7FrdyE9w1YlSB1yC2lX9Q/PQqVOxToGCIlhPk +JvGlPa6O4ZIkhBUKDt6XJdYrRrzlM3bV5Z1lNvW02ii7KG0pDWpzGHuUdkKIF1p0 +qHugXJ4OG+lOr5n0KKfUE66gfJV0WVUDBPCeEuBun75YG++TP2w= +=P8y6 +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:12.telnet.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:12.telnet.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,136 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:12.telnet Security Advisory + The FreeBSD Project + +Topic: telnet(1) client multiple vulnerabilities + +Category: contrib +Module: contrib/telnet +Announced: 2019-07-24 +Credits: Juniper Networks +Affects: All supported versions of FreeBSD. +Corrected: 2019-07-19 15:37:29 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:51:52 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-19 15:27:53 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:51:52 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:51:52 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-0053 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +The telnet(1) command is a TELNET protocol client, used primarily to +establish terminal sessions across a network. + +II. Problem Description + +Insufficient validation of environment variables in the telnet client +supplied in FreeBSD can lead to stack-based buffer overflows. A stack- +based overflow is present in the handling of environment variables when +connecting via the telnet client to remote telnet servers. + +This issue only affects the telnet client. Inbound telnet sessions to +telnetd(8) are not affected by this issue. + +III. Impact + +These buffer overflows may be triggered when connecting to a malicious +server, or by an active attacker in the network path between the client +and server. Specially crafted TELNET command sequences may cause the +execution of arbitrary code with the privileges of the user invoking +telnet(1). + +IV. Workaround + +Do not use telnet(1) to connect to untrusted machines or over an +untrusted network. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-19:12/telnet.patch +# fetch https://security.FreeBSD.org/patches/SA-19:12/telnet.patch.asc +# gpg --verify telnet.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r350139 +releng/12.0/ r350281 +stable/11/ r350140 +releng/11.2/ r350281 +releng/11.3/ r350281 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WltfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cLOzA//YxRZNUr+d8B+t6DnBUbVvthJiY9sQ1YPXUIJmp4QA7wvXr5UjURw+6qv +raxEp6JmF06wZK4RjeIFckQD6s2wnjO5VHO80Zbs0nD4NejQGeDAIlVdKqofOtJv +bBQNSY3vPAtumyfElc+N19rKetAjGbsUjOMbn87GlWrit4lqcavBQsdmSlQB5gVA +dFAFsVxr+ujjATnrCmIpFiaDk0unyJ7Gtz7jiM9I8xZueJtM49/9kNCFFLKCMUl8 +HpB2k0cb18GVNJoKtzo1nELOM/oIJVO5HZt1fmYG/RgeL1BSyzg4q/5jXJQopJ2h +Qax7fmMP+RpGGrfp9Uom63tj79eQk2NirpUtfAaYkfGKzj6fNcq/7jxZfbobx0R8 +uTiF88mlv2/SGxpo11Z/QBqOSYTQtjDRYJvjCo77g7YW8HauECC3tiklpPfFOIO8 +m5qNOORKI74Do377GBF3gxDF2T8ILwj1j7nKHf3apotvQXJkkbpWBG7ADRTFcZWd +PMKdYiDPHV33YmCAg9tOAqV4O7TvaB07ZLKiI6kuSBtPVrazB8Az/oRJwfF6JQ6g +4ZdinyCrXWYrWslkW8402GKCERFFYJUvwLSUqHxYMRgZWPy9zf/mH56vh4bleYnP +kz2X7OgtB3Juu0Uzwv927+KZuyzitniaPlLe9tsyBwXFbUM+BrY= +=LWVf +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:13.pts.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:13.pts.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,132 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:13.pts Security Advisory + The FreeBSD Project + +Topic: pts(4) write-after-free + +Category: core +Module: kernel +Announced: 2019-07-24 +Credits: syzkaller +Affects: All supported versions of FreeBSD. +Corrected: 2019-07-07 14:19:46 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:53:06 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-07 14:20:14 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:53:06 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:53:06 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-5606 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +The posix_openpt(2) system call allocates a pseudo-terminal device and +returns a descriptor referencing that device. Such a descriptor may be +configured such that a SIGIO signal will be sent to a designated process +or process group when the device is ready to perform I/O. + +II. Problem Description + +The code which handles a close(2) of a descriptor created by +posix_openpt(2) fails to undo the configuration which causes SIGIO to be +raised. This bug can lead to a write-after-free of kernel memory. + +III. Impact + +The bug permits malicious code to trigger a write-after-free, which may +be used to gain root privileges or escape a jail. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-19:13/pts.patch +# fetch https://security.FreeBSD.org/patches/SA-19:13/pts.patch.asc +# gpg --verify pts.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r349805 +releng/12.0/ r350282 +stable/11/ r349806 +releng/11.2/ r350282 +releng/11.3/ r350282 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04Wl9fFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cLZDA//SGC+7Vghtofm/CzylIXhC1drFOxNYJOF7KEJqDwsRR3U9S99Q9NBWS5+ +e+/vJzvV0+epZNQXDlit5a76jGwy4fNuutNh0J3APHe/l0Zp/PhM56IwRWQgqAkQ +hF67xhHxFZs8AH6/bw21N4IkRrAZHmrrCY8ubZArjoUi0gCoFzAYRw1Nh/JTQoLS +IGuqUFaMZWKvu3aeJiikLjHiJUMRAY7sxh+iSBSp99dsLkASqQZtx1grmosljttN +fuD7qO2f067EWUpC50JTbNt9V7za854hrlOp8jn1g51O4fWWJoEEL2/0VUeOO+fr +aGS9UNal25NPr2zGzx2t0u1VNE3/YKoZ0tq+mQYtaXke32ZO15Ufby0YcLU4DF8d +dU1ZoG2AGbWmBqgQ982hocq5Dn0r5yCHXDeEGguE1DsfyBuUEZw6zfYRtzIQ0swk +wDrdETxpIMa8jaSGtDw2bilrLNRIVqYkXBJftC3fpXhlz6PyU6bZaFm00xrs7z1D +EJMkuIWho9oMqLTU7bZNHv7JD4G3ziTF1h2tGXGcEKp02ImNZQnw3w5PBberFgto +H4uJQCWgFqqddkjnSidX3Uj676LC99ERDEUlqi+xnXMmBScJnQuRtiUdbpOCkPD2 +gLJmcyy7qjKw87i8KaQF5hUcym2D9xygbUV+I4RT93jR2DCVBA0= +=Cpu+ +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:14.freebsd32.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:14.freebsd32.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,135 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:14.freebsd32 Security Advisory + The FreeBSD Project + +Topic: Kernel memory disclosure in freebsd32_ioctl + +Category: core +Module: kernel +Announced: 2019-07-24 +Credits: Ilja van Sprundel, IOActive +Affects: FreeBSD 11.2 and FreeBSD 11.3 +Corrected: 2019-07-22 18:14:34 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:54:10 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:54:10 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-5605 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +The FreeBSD kernel supports executing 32-bit applications on a 64-bit +kernel, including the ioctl(2) interface. + +II. Problem Description + +Due to insufficient initialization of memory copied to userland in the +components listed above small amounts of kernel memory may be disclosed +to userland processes. + +III. Impact + +A user who can invoke 32-bit FreeBSD ioctls may be able to read the +contents of small portions of kernel memory. + +Such memory might contain sensitive information, such as portions of the +file cache or terminal buffers. This information might be directly +useful, or it might be leveraged to obtain elevated privileges in some +way; for example, a terminal buffer might include a user-entered +password. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-19:14/freebsd32.patch +# fetch https://security.FreeBSD.org/patches/SA-19:14/freebsd32.patch.asc +# gpg --verify freebsd32.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/11/ r350217 +releng/11.2/ r350283 +releng/11.3/ r350283 +- ------------------------------------------------------------------------- + +Note: This issue was addressed in a different way prior to the branch point +for stable/12. As such, no patch is needed for FreeBSD 12.x. + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WmNfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIavw//emdRXVNpGREW1FfUvWmUPpdgk6rFck9nEG0KUKYCcfhqN83BN9XtqaWu +lBQ1jbB/CsalwL6Gpn2yuMvgS8W4yUidyPHLpzuoAThlsy5bHID1/oRftJt0T0BS +kHbTD0tTUt3QDV51FoLBjvXfjRRb8xJ+wIGJ0NzOscWgjgu6JPUysHEJD3+vSOKN +X3qJd3zcoYqswcvuhoVE2cFrSaZKEyIi1pJVr9CGItQTWXIisgdXdGYTnBdZU8jq +iJGaI1BXiNUl/p/21JA32T+ZD7cdMtx6KiuoKlY7Bzgj7Qk3XW7xsQsYu724LIJT +pVhIxntMrQSak7wIaqNPGR/FgkkKDsoo6iCHXlGxXv6tLg7pnioZIaHhc5+UZqmT +8I0UogWhQZS03/nwFRVDLPp+ka2P0g2gsm/dX1UVuucMT+hGeqn2c/iaSU76duoR +qavRPjLPJDnfVrpXhpqco9rq1+UwA/1uSNe0cFX0ArX040hCReDsMphcxgrkZ0sD +u71Px2ZLE5rpWmFd8LD0X2y1l4OEcTmoTPUtJxHlVrMFztuNbAlRnyCxTV8c2uId +zN44wRj6c2ZEV/w+kBVTV+L7NSt1eHDZ5tgUL7boEOylEgkHTl30aZ8nV2wvpaM3 +1Y/IwBnGmI4iNLMnRoIDlac6rR3dMUS4gtH+lkfxlBri9Qc3Qso= +=8LlB +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:15.mqueuefs.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:15.mqueuefs.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,138 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:15.mqueuefs Security Advisory + The FreeBSD Project + +Topic: Reference count overflow in mqueue filesystem + +Category: core +Module: kernel +Announced: 2019-07-24 +Credits: Mateusz Guzik +Affects: All supported versions of FreeBSD. +Corrected: 2019-07-23 21:12:32 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:55:16 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-23 21:15:28 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:55:16 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:55:16 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-5603 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +mqueuefs(5) implements POSIX message queue file system which can be used +by processes as a communication mechanism. + +'struct file' represents open files, directories, sockets and other +entities. + +II. Problem Description + +System calls operating on file descriptors obtain a reference to +relevant struct file which due to a programming error was not always put +back, which in turn could be used to overflow the counter of affected +struct file. + +III. Impact + +A local user can use this flaw to obtain access to files, directories, +sockets etc. opened by processes owned by other users. If obtained +struct file represents a directory from outside of user's jail, it can +be used to access files outside of the jail. If the user in question is +a jailed root they can obtain root privileges on the host system. + +IV. Workaround + +No workaround is available. Note that the mqueuefs file system is not +enabled by default. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-19:15/mqueuefs.patch +# fetch https://security.FreeBSD.org/patches/SA-19:15/mqueuefs.patch.asc +# gpg --verify mqueuefs.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r350261 +releng/12.0/ r350284 +stable/11/ r350263 +releng/11.2/ r350284 +releng/11.3/ r350284 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WmdfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIWpBAAg9BmPamkj7wLJODR8SvNk+qYqEbYeakiSGnvXllz2l+qI2dhMVsuQRGQ +ko7VY0P2Wuh68UiiDG63Oq3hbOWPPkL1axk6n275rZSdoVj856tjrHjnUtP3UX5S +WQUKRAREjhVjM9dAOwCYrmAmcpX4SkslklhfiR6AR62t4eptMlfJ6ACQATs6FPnX +WRdyDe7yq0mL4UHWg+PvotQ+rxGiynwgVRMXwaglKOldGOuPOeuj7azM4nb6/qkN +GjJlJOIRwfU1/sXVII3cCzndnCrz5A0sSttg4JK+uzneJNze+rOghGbyQ9F046z9 +H0M0Ae6M74UCyioyoTrQgvivWvATtNRkLBoRfvHQUNGSt6bS9g1F0N5J7NCgaIPx +vos7P4vnRM1avEAAnAhmm9eYAkO5VLmTb1ry5vOY1o2viesN3P0URcj7o+JIipaA +Kqlff154N2nJmCkT0BJ3m+80GWeAnwqli/LvAIruXxc2hqgWLh7wO+71mraPrV5Z +2+IiuLPMF18FdpTBjhXyX5zCtW7t7uARgZLJMjM+hTXc7aAer7746XY5JyXfRsa9 +jLVWHlff2YoF7DySyDIC7+ONfPIHGgr45imdJgJ9Cxu31ZBmCjesNR4x1DCKgLvT +KnpBvofWIkIb8sEikEnXMfrHqoP/RtVtK73GlmT7sbH9PDQPUYw= +=ehKK +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:16.bhyve.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:16.bhyve.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,135 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:16.bhyve Security Advisory + The FreeBSD Project + +Topic: Bhyve out-of-bounds read in XHCI device + +Category: core +Module: bhyve +Announced: 2019-07-24 +Credits: Reno Robert +Affects: All supported versions of FreeBSD. +Corrected: 2019-07-23 17:48:37 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:56:06 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-23 17:48:37 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:56:06 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:56:06 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-5604 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +bhyve(8) is a hypervisor that supports running a variety of virtual +machines (guests). bhyve includes an emulated XHCI device. + +II. Problem Description + +The pci_xhci_device_doorbell() function does not validate the 'epid' and +'streamid' provided by the guest, leading to an out-of-bounds read. + +III. Impact + +A misbehaving bhyve guest could crash the system or access memory that +it should not be able to. + +IV. Workaround + +No workaround is available, however systems not using bhyve(8) for +virtualization are not vulnerable. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +No reboot is required. Rather the bhyve(8) process for vulnerable virtual +machines should be restarted. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +Restart any bhyve virtual machines or reboot the system. + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-19:16/bhyve.patch +# fetch https://security.FreeBSD.org/patches/SA-19:16/bhyve.patch.asc +# gpg --verify bhyve.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart any bhyve virtual machines, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r350246 +releng/12.0/ r350285 +stable/11/ r350247 +releng/11.2/ r350285 +releng/11.3/ r350285 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WmtfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cI+Jw//TcrKrFaXkEJtqzspjoeK9YKwNwj30ewdb/Ph3GdcgVoQmfJVsWPcmcM9 ++dewKdl7gGLhVhoJ+3f3oFzlDcqSxFLHcNwSW5J7P8Zt+7ZpQzwH8pfB6S8T1Nk6 +77Sv5hYrjy8kdSh6Z/c8BkAQrhEFYO09xej8ekQ1B+iL2N4ErexpCNTMKlP96pGS +0/4tso5gdcwrc1t6HHGffFkjItgnE8Lvgr1ZsSHbcRGAc3nqy3n21U+VH+fecAzK +0NBO3HQeCbRIEdAms3jMLcAJGrs60VBN0nnWqLxlGBb10hY7Si0NkgbWOP2g/Elf +J+K4SHTFXbhIGrpsrEdvSVPvytQ8gKOSys5luvtLjt0Yhll08eEUDVzaIk//Hsak +BcUSlKHULLkVTJZvdZAHUMHJOMPpSAh61DuFcM+pxAt5E9rmgX+HnPBs1yLbgd23 +NaQadFC126T+AW5W5GyOs2BIEo4bdTNHqONF7gmR4a5bv6/7GWZz/QNsep43jDZH +43lur9mts+/1LUCD1s4DkMniNMaGt28GMNa44PgQVzHI7NU/gdVe25TLnAv+X9lO +aAkV/WAyszux/Io2G2DfJNTc8Am/xRzFBvmydOnbMtzw8X/xgxB1/0ysl51O9Bdw +OhfpMygAsxbG0e8y5VuhpuoHd8/vIoBmA0z+u1tt4zxJIXgqSgE= +=/161 +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:17.fd.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:17.fd.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,146 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:17.fd Security Advisory + The FreeBSD Project + +Topic: File description reference count leak + +Category: core +Module: unix +Announced: 2019-07-24 +Credits: Mark Johnston +Affects: All supported versions of FreeBSD. +Corrected: 2019-07-22 19:25:05 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:57:49 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-22 19:27:23 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:57:49 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:57:49 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-5607 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +UNIX-domain sockets are used for inter-process communication. It is +possible to use UNIX-domain sockets to transfer rights, encoded as file +descriptors, to another process. Rights are encapsulated in control +messages, and multiple such messages may be transmitted with a single +system call. + +II. Problem Description + +If a process attempts to transmit rights over a UNIX-domain socket and +an error causes the attempt to fail, references acquired on the rights +are not released and are leaked. This bug can be used to cause the +reference counter to wrap around and free the corresponding file +structure. + +III. Impact + +A local user can exploit the bug to gain root privileges or escape from +a jail. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 11.2] +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.11.2.patch +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.11.2.patch.asc +# gpg --verify fd.11.2.patch.asc + +[FreeBSD 11.3] +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.11.patch +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.11.patch.asc +# gpg --verify fd.11.patch.asc + +[FreeBSD 12.0] +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.12.patch +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.12.patch.asc +# gpg --verify fd.12.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r350222 +releng/12.0/ r350286 +stable/11/ r350223 +releng/11.2/ r350286 +releng/11.3/ r350286 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WnBfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIOTQ/+KQMGXwNiuMVNib5ErewD9QdT48NYaU/hYUub3VMAfQltvWmbiPw7zXj7 +yJGm9FxWrMvZ6hFnKskV60u9d7PMYkOv4nzcaFgPoadByXXlALQGd/ansrZFyTJr +bDeBs7J3dM/VnH/lSlPc/LlbnH4iN+gj6SSqpsWAIdq99VIviAnzHTr7SniGfXul +hP+5+xSlfAYOKuH7jM1+gpuld9kR2QzGObiUJ6gfJk+I41C90tSJHb3v+DCanyrM +N2NXKbkgRtZoaIItiqZVIKHJP+VaHOnHCBq3uEbj2+OR7I5yFkDYdQbTiWVU1bl0 +9Ps/5LPDEiQYQqgCGadzZyqyEHvoPFy2vWvc1GFya6cV1L3gtM51C713ci2Xa3NK +ZknS4bIC2Nhtrf9PcFJRkMKW8OOdwYi/2vL9I4W/PAs2EV3thQivBB7dH9TYRTdC +BWP2tFM+isibjezJfj2RAjdAq0Kln0U+4AkNWgNNToyzSNFJ0LBtvzlgS7mmtuN0 +mA9n7tYyQM5vCXEQqcC3hIkJSeNE2Sj4/RVd8oo1Ngh1el0AFTJ2aq+QowG/lWO/ +pK1lvOQXMPElbSSxCytqALWY995VRxmEUO/TF6pCgsRDIXxx+eSf1XrtT2d1+Na7 +nzt511Ho9/F4Uwbih7u+IhnWReB2Da0djLBWUtOc+HsMLQZVAUk= +=juJj +-----END PGP SIGNATURE----- Added: head/share/security/patches/EN-19:13/mds.11.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-19:13/mds.11.patch Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,18 @@ +--- sys/x86/x86/cpu_machdep.c.orig ++++ sys/x86/x86/cpu_machdep.c +@@ -953,7 +953,6 @@ + * architectural state except possibly %rflags. Also, it is always + * called with interrupts disabled. + */ +-void (*mds_handler)(void); + void mds_handler_void(void); + void mds_handler_verw(void); + void mds_handler_ivb(void); +@@ -962,6 +961,7 @@ + void mds_handler_skl_avx(void); + void mds_handler_skl_avx512(void); + void mds_handler_silvermont(void); ++void (*mds_handler)(void) = mds_handler_void; + + static int + sysctl_hw_mds_disable_state_handler(SYSCTL_HANDLER_ARGS) Added: head/share/security/patches/EN-19:13/mds.11.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-19:13/mds.11.patch.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,18 @@ *** DIFF OUTPUT TRUNCATED AT 1000 LINES ***