From owner-svn-doc-all@freebsd.org Sun Jul 21 11:04:40 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EABD1B0A65; Sun, 21 Jul 2019 11:04:40 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id CB1A47505E; Sun, 21 Jul 2019 11:04:40 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id A1BC822296; Sun, 21 Jul 2019 11:04:40 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6LB4eAd011145; Sun, 21 Jul 2019 11:04:40 GMT (envelope-from rene@FreeBSD.org) Received: (from rene@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6LB4dhE011142; Sun, 21 Jul 2019 11:04:39 GMT (envelope-from rene@FreeBSD.org) Message-Id: <201907211104.x6LB4dhE011142@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rene set sender to rene@FreeBSD.org using -f From: Rene Ladan Date: Sun, 21 Jul 2019 11:04:39 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53264 - in head: en_US.ISO8859-1/articles/contributors en_US.ISO8859-1/htdocs share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: rene X-SVN-Commit-Paths: in head: en_US.ISO8859-1/articles/contributors en_US.ISO8859-1/htdocs share/xml X-SVN-Commit-Revision: 53264 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: CB1A47505E X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.96 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.96)[-0.956,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 21 Jul 2019 11:04:41 -0000 Author: rene Date: Sun Jul 21 11:04:39 2019 New Revision: 53264 URL: https://svnweb.freebsd.org/changeset/doc/53264 Log: Mark Felder has stepped down from portmgr and ports-secteam. Modified: head/en_US.ISO8859-1/articles/contributors/contrib.portmgralumni.xml head/en_US.ISO8859-1/htdocs/administration.xml head/share/xml/authors.ent Modified: head/en_US.ISO8859-1/articles/contributors/contrib.portmgralumni.xml ============================================================================== --- head/en_US.ISO8859-1/articles/contributors/contrib.portmgralumni.xml Thu Jul 18 15:51:46 2019 (r53263) +++ head/en_US.ISO8859-1/articles/contributors/contrib.portmgralumni.xml Sun Jul 21 11:04:39 2019 (r53264) @@ -4,6 +4,10 @@ xmlns:xlink="http://www.w3.org/1999/xlink" version="5.0"> + &a.feld.email; (2016 - 2019) + + + &a.miwi.email; (2009 - 2016) Modified: head/en_US.ISO8859-1/htdocs/administration.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/administration.xml Thu Jul 18 15:51:46 2019 (r53263) +++ head/en_US.ISO8859-1/htdocs/administration.xml Sun Jul 21 11:04:39 2019 (r53264) @@ -138,7 +138,6 @@
  • &a.antoine.email;
  • &a.bapt.email; (Core Team Liaison)
  • &a.bdrewery.email; (Release Engineering Team Liaison)
  • -
  • &a.feld.email;
  • &a.mat.email; (Cluster Administration Team Liaison)
  • &a.rene.email; (Secretary)
  • &a.swills.email;
  • @@ -164,7 +163,6 @@
  • &a.rea.email;
  • &a.jgh.email;
  • &a.joneum.email;
  • -
  • &a.feld.email;
  • &a.miwi.email;
  • &a.zi.email;
  • &a.simon.email;
  • Modified: head/share/xml/authors.ent ============================================================================== --- head/share/xml/authors.ent Thu Jul 18 15:51:46 2019 (r53263) +++ head/share/xml/authors.ent Sun Jul 21 11:04:39 2019 (r53264) @@ -2665,7 +2665,7 @@ irc@FreeBSD.org"> - + From owner-svn-doc-all@freebsd.org Mon Jul 22 21:13:34 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EAE77BC208; Mon, 22 Jul 2019 21:13:34 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id CBC608B9C5; Mon, 22 Jul 2019 21:13:34 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 801941B387; Mon, 22 Jul 2019 21:13:34 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6MLDYFt058467; Mon, 22 Jul 2019 21:13:34 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6MLDYqn058466; Mon, 22 Jul 2019 21:13:34 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201907222113.x6MLDYqn058466@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Mon, 22 Jul 2019 21:13:34 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53265 - head/de_DE.ISO8859-1/books/handbook/firewalls X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/firewalls X-SVN-Commit-Revision: 53265 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: CBC608B9C5 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.96 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.96)[-0.961,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Jul 2019 21:13:35 -0000 Author: bhd Date: Mon Jul 22 21:13:34 2019 New Revision: 53265 URL: https://svnweb.freebsd.org/changeset/doc/53265 Log: Update to r52936: This patch updates the PF chapter regarding structure and various updates. Modified: head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Sun Jul 21 11:04:39 2019 (r53264) +++ head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Mon Jul 22 21:13:34 2019 (r53265) @@ -5,7 +5,7 @@ $FreeBSD$ $FreeBSDde: de-docproj/books/handbook/firewalls/chapter.xml,v 1.53 2012/04/30 16:15:52 bcr Exp $ - basiert auf: r52855 + basiert auf: r52936 --> Bedenken Sie beim Studium der PF FAQ, - dass &os; die PF-Version aus - OpenBSD 4.5 enthält. + dass die PF-Version von &os; + im Laufe der Jahre erheblich von der Version in OpenBSD + abgewichen ist. Nicht alle Eigenschaften funktionieren + unter &os; genauso wie unter OpenBSD und umgekehrt. Die &a.pf; ist ein guter Anlaufpunkt für Fragen zur @@ -378,31 +380,26 @@ Frage stellen. Vielleicht wurde die Frage dort schon beantwortet. - Weitere Informationen über die Portierung von - PF nach &os; finden Sie unter - http://pf4freebsd.love2party.net/. - Dieser Abschnitt konzentriert sich auf PF in &os;. Es wird beschrieben, wie PF und - ALTQ aktiviert werden. Anschließend + ALTQ aktiviert werden. Zusätzlich wird demonstriert, wie Regelsätze auf einem &os;-System erstellt werden. <application>PF</application> aktivieren - Damit PF benutzt werden kann, + Um PF zu benutzen, muss zunächst das Kernelmodul geladen werden. Dieser Abschnitt beschreibt die Einträge für /etc/rc.conf, die verwendet werden können um PF zu aktivieren. - Beginnen Sie mit folgender Zeile in - /etc/rc.conf: + Beginnen Sie damit pf_enable=yes in + /etc/rc.conf hinzuzufügen: - pf_enable="YES" + &prompt.root; sysrc pf_enable=yes &man.pfctl.8; beschreibt zusätzliche Optionen, die beim Start an PF übergeben werden @@ -425,15 +422,17 @@ Protokollierungsfunktionen für PF werden von &man.pflog.4; zur - Verfügung gestellt. Fügen Sie folgende Zeile in + Verfügung gestellt. Fügen Sie + pflog_enable=yes in /etc/rc.conf ein, um diese Funktion zu aktivieren: - pflog_enable="YES" + &prompt.root; sysrc pflog_enable=yes - Die folgenden Zeilen können ebenfalls hinzugefügt werden, - um den Speicherort der Protokolldatei zu bestimmen und weitere - Optionen beim Start an &man.pflog.4; zu übergeben: + Die folgenden Zeilen können zusätzlich hinzugefügt + werden, um den Speicherort der Protokolldatei zu bestimmen und + weitere Optionen beim Start an &man.pflog.4; zu + übergeben: pflog_logfile="/var/log/pflog" # where pflogd should store the logfile pflog_flags="" # additional flags for pflogd startup @@ -441,8 +440,8 @@ pflog_flags="" # additional flags for Falls ein LAN hinter der Firewall existiert und die Pakete an die Rechner im LAN weitergeleitet werden müssen, oder - wenn NAT benötigt wird, fügen Sie die - folgende Option hinzu: + wenn NAT benötigt wird, aktivieren Sie die + folgende Option: gateway_enable="YES" # Enable as LAN gateway @@ -585,102 +584,6 @@ device pfsync von &man.top.1; sehr ähnlich. - - <application>ALTQ</application> aktivieren - - Unter &os; kann ALTQ zusammen - mit PF benutzt werden, um Quality - of Service (QoS) bereitzustellen. Sobald - ALTQ aktiviert ist, können - Warteschlangen definiert werden, mit denen Sie die Priorität - für ausgehende Pakete festlegen können. - - Bevor Sie ALTQ aktivieren, - sollten Sie &man.altq.4; lesen und sicherstellen, das der - Treiber der Netzwerkkarte diese Funktion unterstützt. - - ALTQ steht nicht als ladbares - Kernelmodul zur Verfügung. Wenn die Netzwerkkarte des Systems - ALTQ unterstützt, erstellen Sie - nach den Anweisungen in einen - angepassten Kernel. Als erstes muss - ALTQ aktiviert werden. Zudem ist - mindestens eine weitere Option nötig, um den Algorithmus für - die Warteschlange zu bestimmen: - - options ALTQ -options ALTQ_CBQ # Class Based Queuing (CBQ) -options ALTQ_RED # Random Early Detection (RED) -options ALTQ_RIO # RED In/Out -options ALTQ_HFSC # Hierarchical Packet Schedule (HFSC) -options ALTQ_PRIQ # Priority Queuing (PRIQ) - - Die folgenden Algorithmen stehen zur Verfügung: - - - - CBQ - - Class Based Queuing (CBQ) erlaubt - es, die Bandbreite einer Verbindung in verschiedene - Klassen oder Warteschlangen zu unterteilen, um die - Priorität von Datenpaketen basierend auf Filterregeln zu - beeinflussen. - - - - - RED - - Random Early Detection (RED) wird - eingesetzt, um eine Überlastung des Netzwerks zu - vermeiden. Dazu ermittelt RED die - Größe der Warteschlange und vergleicht diesen Wert mit - den minimalen und maximalen Grenzwerten der - Warteschlange. Ist die Warteschlange größer als das - erlaubte Maximum, werden alle neuen Pakete nach dem - Zufallsprinzip verworfen. - - - - - RIO - - Random Early Detection In and Out - (RIO). Dieser Modus verwaltet - mehrere Warteschlangen durchschnittlicher Größe mit - mehreren Schwellwerten, eine für jedes - QoS-Level. - - - - - HFSC - - Hierachical Fair Service Curve Packet Scheduler - (HFSC) wird in - http://www-2.cs.cmu.edu/~hzhang/HFSC/main.html - beschrieben. - - - - - PRIQ - - Priority Queuing (PRIQ) lässt den - Verkehr einer Warteschlange mit höherer Priorität zuerst - durch. - - - - - Weitere Informationen über diese Algorithmen und Beispiele - für Regelsätze finden Sie in den - OpenBSD Archiven. - - <application>PF</application> Regelsätze @@ -814,11 +717,11 @@ pass proto udp to any port $udp_services keep state

    &prompt.root; sysctl net.inet6.ip6.forwarding=1 Um diese Einstellungen beim Systemstart zu aktivieren, - fügen Sie folgende Zeilen in + fügen Sie sie mit Hilfe von &man.sysrc.8; in /etc/rc.conf ein: - gateway_enable="YES" #für ipv4 -ipv6_gateway_enable="YES" #für ipv6 + &prompt.root; sysrc gateway_enable=yes +&prompt.root; sysrc ipv6_gateway_enable=yes Prüfen Sie mit ifconfig, dass beide Schnittstellen vorhanden und aktiv sind. @@ -1705,6 +1608,102 @@ antispoof for $int_if block drop in quick on $ext_if from $martians to any block drop out quick on $ext_if from any to $martians +
    + + + <application>ALTQ</application> aktivieren + + Unter &os; kann ALTQ zusammen + mit PF benutzt werden, um Quality + of Service (QoS) bereitzustellen. Sobald + ALTQ aktiviert ist, können + Warteschlangen definiert werden, mit denen Sie die Priorität + für ausgehende Pakete festlegen können. + + Bevor Sie ALTQ aktivieren, + sollten Sie &man.altq.4; lesen und sicherstellen, das der + Treiber der Netzwerkkarte diese Funktion unterstützt. + + ALTQ steht nicht als ladbares + Kernelmodul zur Verfügung. Wenn die Netzwerkkarte des Systems + ALTQ unterstützt, erstellen Sie + nach den Anweisungen in einen + angepassten Kernel. Als erstes muss + ALTQ aktiviert werden. Zudem ist + mindestens eine weitere Option nötig, um den Algorithmus für + die Warteschlange zu bestimmen: + + options ALTQ +options ALTQ_CBQ # Class Based Queuing (CBQ) +options ALTQ_RED # Random Early Detection (RED) +options ALTQ_RIO # RED In/Out +options ALTQ_HFSC # Hierarchical Packet Schedule (HFSC) +options ALTQ_PRIQ # Priority Queuing (PRIQ) + + Die folgenden Algorithmen stehen zur Verfügung: + + + + CBQ + + Class Based Queuing (CBQ) erlaubt + es, die Bandbreite einer Verbindung in verschiedene + Klassen oder Warteschlangen zu unterteilen, um die + Priorität von Datenpaketen basierend auf Filterregeln zu + beeinflussen. + + + + + RED + + Random Early Detection (RED) wird + eingesetzt, um eine Überlastung des Netzwerks zu + vermeiden. Dazu ermittelt RED die + Größe der Warteschlange und vergleicht diesen Wert mit + den minimalen und maximalen Grenzwerten der + Warteschlange. Ist die Warteschlange größer als das + erlaubte Maximum, werden alle neuen Pakete nach dem + Zufallsprinzip verworfen. + + + + + RIO + + Random Early Detection In and Out + (RIO). Dieser Modus verwaltet + mehrere Warteschlangen durchschnittlicher Größe mit + mehreren Schwellwerten, eine für jedes + QoS-Level. + + + + + HFSC + + Hierachical Fair Service Curve Packet Scheduler + (HFSC) wird in + http://www-2.cs.cmu.edu/~hzhang/HFSC/main.html + beschrieben. + + + + + PRIQ + + Priority Queuing (PRIQ) lässt den + Verkehr einer Warteschlange mit höherer Priorität zuerst + durch. + + + + + Weitere Informationen über diese Algorithmen und Beispiele + für Regelsätze finden Sie in den + OpenBSD Archiven. From owner-svn-doc-all@freebsd.org Tue Jul 23 18:24:11 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B046FAFED3; Tue, 23 Jul 2019 18:24:11 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 925E16EDB5; Tue, 23 Jul 2019 18:24:11 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 6B2F51BF8; Tue, 23 Jul 2019 18:24:11 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6NIOB6m018191; Tue, 23 Jul 2019 18:24:11 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6NIOBTd018190; Tue, 23 Jul 2019 18:24:11 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201907231824.x6NIOBTd018190@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Tue, 23 Jul 2019 18:24:11 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53266 - head/de_DE.ISO8859-1/books/handbook/firewalls X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/firewalls X-SVN-Commit-Revision: 53266 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 925E16EDB5 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.95)[-0.951,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 23 Jul 2019 18:24:11 -0000 Author: bhd Date: Tue Jul 23 18:24:10 2019 New Revision: 53266 URL: https://svnweb.freebsd.org/changeset/doc/53266 Log: Typo. Modified: head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Mon Jul 22 21:13:34 2019 (r53265) +++ head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Jul 23 18:24:10 2019 (r53266) @@ -1295,7 +1295,7 @@ pass inet proto tcp from any to $localnet port $tcp_se - Schutzt vor <acronym>SPAM</acronym> + Schutz vor <acronym>SPAM</acronym> Im Gegensatz zum spamd-Daemon von spamassassin, kann From owner-svn-doc-all@freebsd.org Wed Jul 24 04:55:32 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 12A44BCB87; Wed, 24 Jul 2019 04:55:32 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id E77C68E3E7; Wed, 24 Jul 2019 04:55:31 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id C069F9207; Wed, 24 Jul 2019 04:55:31 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6O4tVdV093758; Wed, 24 Jul 2019 04:55:31 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6O4tVm6093757; Wed, 24 Jul 2019 04:55:31 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201907240455.x6O4tVm6093757@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Wed, 24 Jul 2019 04:55:31 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53267 - head/en_US.ISO8859-1/htdocs/releases/11.3R X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/releases/11.3R X-SVN-Commit-Revision: 53267 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: E77C68E3E7 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.95)[-0.953,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Jul 2019 04:55:32 -0000 Author: gjb Date: Wed Jul 24 04:55:31 2019 New Revision: 53267 URL: https://svnweb.freebsd.org/changeset/doc/53267 Log: Update the 11.3-RELEASE schedule to reflect releng/11.3 has been turned over to secteam. Sponsored by: Rubicon Communications, LLC (Netgate) Modified: head/en_US.ISO8859-1/htdocs/releases/11.3R/schedule.xml Modified: head/en_US.ISO8859-1/htdocs/releases/11.3R/schedule.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/11.3R/schedule.xml Tue Jul 23 18:24:10 2019 (r53266) +++ head/en_US.ISO8859-1/htdocs/releases/11.3R/schedule.xml Wed Jul 24 04:55:31 2019 (r53267) @@ -157,7 +157,7 @@ Turn over to the secteam - - - + 24 July 2019 &local.branch.releng; branch is handed over to the &os; Security Officer Team in one or two weeks after the announcement. From owner-svn-doc-all@freebsd.org Wed Jul 24 04:56:11 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1BEEDBCBC9; Wed, 24 Jul 2019 04:56:11 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id F345F8E44E; Wed, 24 Jul 2019 04:56:10 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id CD0629208; Wed, 24 Jul 2019 04:56:10 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6O4uAG4093831; Wed, 24 Jul 2019 04:56:10 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6O4uAnC093830; Wed, 24 Jul 2019 04:56:10 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201907240456.x6O4uAnC093830@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Wed, 24 Jul 2019 04:56:10 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53268 - head/en_US.ISO8859-1/htdocs/releng X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/releng X-SVN-Commit-Revision: 53268 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: F345F8E44E X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.95)[-0.953,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Jul 2019 04:56:11 -0000 Author: gjb Date: Wed Jul 24 04:56:10 2019 New Revision: 53268 URL: https://svnweb.freebsd.org/changeset/doc/53268 Log: Update the releng index page to reflect releng/11.3 is turned over to so@. Approved by: re (implicit) Sponsored by: Rubicon Communications, LLC (Netgate) Modified: head/en_US.ISO8859-1/htdocs/releng/index.xml Modified: head/en_US.ISO8859-1/htdocs/releng/index.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releng/index.xml Wed Jul 24 04:55:31 2019 (r53267) +++ head/en_US.ISO8859-1/htdocs/releng/index.xml Wed Jul 24 04:56:10 2019 (r53268) @@ -113,7 +113,7 @@ releng/11.3 Frozen - &contact.re; + &contact.so; FreeBSD 11.3 supported errata fix branch. From owner-svn-doc-all@freebsd.org Wed Jul 24 13:28:54 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9C989A8305; Wed, 24 Jul 2019 13:28:54 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 8797582BAF; Wed, 24 Jul 2019 13:28:54 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 622B5EFC8; Wed, 24 Jul 2019 13:28:54 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6ODSsaX094567; Wed, 24 Jul 2019 13:28:54 GMT (envelope-from gordon@FreeBSD.org) Received: (from gordon@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6ODSqWb094555; Wed, 24 Jul 2019 13:28:52 GMT (envelope-from gordon@FreeBSD.org) Message-Id: <201907241328.x6ODSqWb094555@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gordon set sender to gordon@FreeBSD.org using -f From: Gordon Tetlow Date: Wed, 24 Jul 2019 13:28:52 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53269 - in head/share: security/advisories security/patches/EN-19:13 security/patches/SA-19:12 security/patches/SA-19:13 security/patches/SA-19:14 security/patches/SA-19:15 security/pa... X-SVN-Group: doc-head X-SVN-Commit-Author: gordon X-SVN-Commit-Paths: in head/share: security/advisories security/patches/EN-19:13 security/patches/SA-19:12 security/patches/SA-19:13 security/patches/SA-19:14 security/patches/SA-19:15 security/patches/SA-19:16 security/... X-SVN-Commit-Revision: 53269 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 8797582BAF X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.97 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.97)[-0.967,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Jul 2019 13:28:54 -0000 Author: gordon (src committer) Date: Wed Jul 24 13:28:52 2019 New Revision: 53269 URL: https://svnweb.freebsd.org/changeset/doc/53269 Log: Add EN-19:13 and SA-19:12 to SA-19:17. Approved by: so Added: head/share/security/advisories/FreeBSD-EN-19:13.mds.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:12.telnet.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:13.pts.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:14.freebsd32.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:15.mqueuefs.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:16.bhyve.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-19:17.fd.asc (contents, props changed) head/share/security/patches/EN-19:13/ head/share/security/patches/EN-19:13/mds.11.patch (contents, props changed) head/share/security/patches/EN-19:13/mds.11.patch.asc (contents, props changed) head/share/security/patches/EN-19:13/mds.12.patch (contents, props changed) head/share/security/patches/EN-19:13/mds.12.patch.asc (contents, props changed) head/share/security/patches/SA-19:12/ head/share/security/patches/SA-19:12/telnet.patch (contents, props changed) head/share/security/patches/SA-19:12/telnet.patch.asc (contents, props changed) head/share/security/patches/SA-19:13/ head/share/security/patches/SA-19:13/pts.patch (contents, props changed) head/share/security/patches/SA-19:13/pts.patch.asc (contents, props changed) head/share/security/patches/SA-19:14/ head/share/security/patches/SA-19:14/freebsd32.patch (contents, props changed) head/share/security/patches/SA-19:14/freebsd32.patch.asc (contents, props changed) head/share/security/patches/SA-19:15/ head/share/security/patches/SA-19:15/mqueuefs.patch (contents, props changed) head/share/security/patches/SA-19:15/mqueuefs.patch.asc (contents, props changed) head/share/security/patches/SA-19:16/ head/share/security/patches/SA-19:16/bhyve.patch (contents, props changed) head/share/security/patches/SA-19:16/bhyve.patch.asc (contents, props changed) head/share/security/patches/SA-19:17/ head/share/security/patches/SA-19:17/fd.11.2.patch (contents, props changed) head/share/security/patches/SA-19:17/fd.11.2.patch.asc (contents, props changed) head/share/security/patches/SA-19:17/fd.11.patch (contents, props changed) head/share/security/patches/SA-19:17/fd.11.patch.asc (contents, props changed) head/share/security/patches/SA-19:17/fd.12.patch (contents, props changed) head/share/security/patches/SA-19:17/fd.12.patch.asc (contents, props changed) Modified: head/share/xml/advisories.xml head/share/xml/notices.xml Added: head/share/security/advisories/FreeBSD-EN-19:13.mds.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-19:13.mds.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,133 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-19:13.mds Errata Notice + The FreeBSD Project + +Topic: Kernel panic from Intel CPU vulnerability mitigation + +Category: core +Module: kernel +Announced: 2019-07-24 +Credits: Schuendehuette, Matthias + All supported versions of FreeBSD. +Corrected: 2019-07-14 05:40:03 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:50:46 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-14 05:41:43 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:50:46 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:50:46 UTC (releng/11.3, 11.3-RELEASE-p1) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +In a previous update FreeBSD added mitigations for an Intel CPU +vulnerability known as "microarchitectural data sampling." + +II. Problem Description + +Under certain configurations a pointer to the mitigation routine may be +dereferenced before it is initialized. + +III. Impact + +Depending on system configuration, version, and architecture, the system +may panic early in boot process, and thus be unusable. + +IV. Workaround + +No workaround is available. + +V. Solution + +Perform one of the following: + +1) Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date, and reboot. + +2) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Errata update" + +3) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 11.2, FreeBSD 11.3] +# fetch https://security.FreeBSD.org/patches/EN-19:13/mds.11.patch +# fetch https://security.FreeBSD.org/patches/EN-19:13/mds.11.patch.asc +# gpg --verify mds.11.patch.asc + +[FreeBSD 12.0] +# fetch https://security.FreeBSD.org/patches/EN-19:13/mds.12.patch +# fetch https://security.FreeBSD.org/patches/EN-19:13/mds.12.patch.asc +# gpg --verify mds.12.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r349983 +releng/12.0/ r350280 +stable/11/ r349985 +releng/11.2/ r350280 +releng/11.3/ r350280 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WkVfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIkZA//ZbeSb2yAsux4w/nOLXQI1kfNWFT3LjVsiYS0VXCoixHr07nkDNMUv2Pn +08eP+9hy5mtgtooOjxP/aYIzR11+HZKpS/MG1x8KGAA/0TWY4EObJUTQ53UHY5+i +WStyHgKvqgeV2vuTqtjK5eAJfaTQV9huoapcQo0ngJMlbzICxN37UBZhOnSGb5HL +vRAL1AnI37LBWeZJhp3nyNatUjYfaL/HBYVpmuO9g+lgXqcFRpgIZxTNSzpDsAUb +7ARtHNUOelUoeMcMQXHbYtNOpM9c84fWxLftNsVfD3d9+GiHpklU2B++aBfzbTl3 +3lgRRk1p1p0JUNXCJy/cPb6/4SqnQRHehu1pwnJnuOM4PBpLB5HRD4WWGzM2A4Jq +SB1rLKCwfeSWPDQ0/iOs6P+UPFjqV8WvbNmQQT+oZxZH7YSm2TY9EGd8V/3wxzYo ++FeVQ+KTW+qxXTKHnNS9KGD26Xseq8S7Ft4dzIjm6hZVwSwNPBQFnPptv4b42/sQ +1sJxjKwKb7CrJJl4uf7vlIyNRHu7FrdyE9w1YlSB1yC2lX9Q/PQqVOxToGCIlhPk +JvGlPa6O4ZIkhBUKDt6XJdYrRrzlM3bV5Z1lNvW02ii7KG0pDWpzGHuUdkKIF1p0 +qHugXJ4OG+lOr5n0KKfUE66gfJV0WVUDBPCeEuBun75YG++TP2w= +=P8y6 +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:12.telnet.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:12.telnet.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,136 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:12.telnet Security Advisory + The FreeBSD Project + +Topic: telnet(1) client multiple vulnerabilities + +Category: contrib +Module: contrib/telnet +Announced: 2019-07-24 +Credits: Juniper Networks +Affects: All supported versions of FreeBSD. +Corrected: 2019-07-19 15:37:29 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:51:52 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-19 15:27:53 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:51:52 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:51:52 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-0053 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +The telnet(1) command is a TELNET protocol client, used primarily to +establish terminal sessions across a network. + +II. Problem Description + +Insufficient validation of environment variables in the telnet client +supplied in FreeBSD can lead to stack-based buffer overflows. A stack- +based overflow is present in the handling of environment variables when +connecting via the telnet client to remote telnet servers. + +This issue only affects the telnet client. Inbound telnet sessions to +telnetd(8) are not affected by this issue. + +III. Impact + +These buffer overflows may be triggered when connecting to a malicious +server, or by an active attacker in the network path between the client +and server. Specially crafted TELNET command sequences may cause the +execution of arbitrary code with the privileges of the user invoking +telnet(1). + +IV. Workaround + +Do not use telnet(1) to connect to untrusted machines or over an +untrusted network. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-19:12/telnet.patch +# fetch https://security.FreeBSD.org/patches/SA-19:12/telnet.patch.asc +# gpg --verify telnet.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r350139 +releng/12.0/ r350281 +stable/11/ r350140 +releng/11.2/ r350281 +releng/11.3/ r350281 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WltfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cLOzA//YxRZNUr+d8B+t6DnBUbVvthJiY9sQ1YPXUIJmp4QA7wvXr5UjURw+6qv +raxEp6JmF06wZK4RjeIFckQD6s2wnjO5VHO80Zbs0nD4NejQGeDAIlVdKqofOtJv +bBQNSY3vPAtumyfElc+N19rKetAjGbsUjOMbn87GlWrit4lqcavBQsdmSlQB5gVA +dFAFsVxr+ujjATnrCmIpFiaDk0unyJ7Gtz7jiM9I8xZueJtM49/9kNCFFLKCMUl8 +HpB2k0cb18GVNJoKtzo1nELOM/oIJVO5HZt1fmYG/RgeL1BSyzg4q/5jXJQopJ2h +Qax7fmMP+RpGGrfp9Uom63tj79eQk2NirpUtfAaYkfGKzj6fNcq/7jxZfbobx0R8 +uTiF88mlv2/SGxpo11Z/QBqOSYTQtjDRYJvjCo77g7YW8HauECC3tiklpPfFOIO8 +m5qNOORKI74Do377GBF3gxDF2T8ILwj1j7nKHf3apotvQXJkkbpWBG7ADRTFcZWd +PMKdYiDPHV33YmCAg9tOAqV4O7TvaB07ZLKiI6kuSBtPVrazB8Az/oRJwfF6JQ6g +4ZdinyCrXWYrWslkW8402GKCERFFYJUvwLSUqHxYMRgZWPy9zf/mH56vh4bleYnP +kz2X7OgtB3Juu0Uzwv927+KZuyzitniaPlLe9tsyBwXFbUM+BrY= +=LWVf +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:13.pts.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:13.pts.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,132 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:13.pts Security Advisory + The FreeBSD Project + +Topic: pts(4) write-after-free + +Category: core +Module: kernel +Announced: 2019-07-24 +Credits: syzkaller +Affects: All supported versions of FreeBSD. +Corrected: 2019-07-07 14:19:46 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:53:06 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-07 14:20:14 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:53:06 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:53:06 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-5606 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +The posix_openpt(2) system call allocates a pseudo-terminal device and +returns a descriptor referencing that device. Such a descriptor may be +configured such that a SIGIO signal will be sent to a designated process +or process group when the device is ready to perform I/O. + +II. Problem Description + +The code which handles a close(2) of a descriptor created by +posix_openpt(2) fails to undo the configuration which causes SIGIO to be +raised. This bug can lead to a write-after-free of kernel memory. + +III. Impact + +The bug permits malicious code to trigger a write-after-free, which may +be used to gain root privileges or escape a jail. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-19:13/pts.patch +# fetch https://security.FreeBSD.org/patches/SA-19:13/pts.patch.asc +# gpg --verify pts.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r349805 +releng/12.0/ r350282 +stable/11/ r349806 +releng/11.2/ r350282 +releng/11.3/ r350282 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04Wl9fFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cLZDA//SGC+7Vghtofm/CzylIXhC1drFOxNYJOF7KEJqDwsRR3U9S99Q9NBWS5+ +e+/vJzvV0+epZNQXDlit5a76jGwy4fNuutNh0J3APHe/l0Zp/PhM56IwRWQgqAkQ +hF67xhHxFZs8AH6/bw21N4IkRrAZHmrrCY8ubZArjoUi0gCoFzAYRw1Nh/JTQoLS +IGuqUFaMZWKvu3aeJiikLjHiJUMRAY7sxh+iSBSp99dsLkASqQZtx1grmosljttN +fuD7qO2f067EWUpC50JTbNt9V7za854hrlOp8jn1g51O4fWWJoEEL2/0VUeOO+fr +aGS9UNal25NPr2zGzx2t0u1VNE3/YKoZ0tq+mQYtaXke32ZO15Ufby0YcLU4DF8d +dU1ZoG2AGbWmBqgQ982hocq5Dn0r5yCHXDeEGguE1DsfyBuUEZw6zfYRtzIQ0swk +wDrdETxpIMa8jaSGtDw2bilrLNRIVqYkXBJftC3fpXhlz6PyU6bZaFm00xrs7z1D +EJMkuIWho9oMqLTU7bZNHv7JD4G3ziTF1h2tGXGcEKp02ImNZQnw3w5PBberFgto +H4uJQCWgFqqddkjnSidX3Uj676LC99ERDEUlqi+xnXMmBScJnQuRtiUdbpOCkPD2 +gLJmcyy7qjKw87i8KaQF5hUcym2D9xygbUV+I4RT93jR2DCVBA0= +=Cpu+ +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:14.freebsd32.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:14.freebsd32.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,135 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:14.freebsd32 Security Advisory + The FreeBSD Project + +Topic: Kernel memory disclosure in freebsd32_ioctl + +Category: core +Module: kernel +Announced: 2019-07-24 +Credits: Ilja van Sprundel, IOActive +Affects: FreeBSD 11.2 and FreeBSD 11.3 +Corrected: 2019-07-22 18:14:34 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:54:10 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:54:10 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-5605 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +The FreeBSD kernel supports executing 32-bit applications on a 64-bit +kernel, including the ioctl(2) interface. + +II. Problem Description + +Due to insufficient initialization of memory copied to userland in the +components listed above small amounts of kernel memory may be disclosed +to userland processes. + +III. Impact + +A user who can invoke 32-bit FreeBSD ioctls may be able to read the +contents of small portions of kernel memory. + +Such memory might contain sensitive information, such as portions of the +file cache or terminal buffers. This information might be directly +useful, or it might be leveraged to obtain elevated privileges in some +way; for example, a terminal buffer might include a user-entered +password. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-19:14/freebsd32.patch +# fetch https://security.FreeBSD.org/patches/SA-19:14/freebsd32.patch.asc +# gpg --verify freebsd32.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/11/ r350217 +releng/11.2/ r350283 +releng/11.3/ r350283 +- ------------------------------------------------------------------------- + +Note: This issue was addressed in a different way prior to the branch point +for stable/12. As such, no patch is needed for FreeBSD 12.x. + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WmNfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIavw//emdRXVNpGREW1FfUvWmUPpdgk6rFck9nEG0KUKYCcfhqN83BN9XtqaWu +lBQ1jbB/CsalwL6Gpn2yuMvgS8W4yUidyPHLpzuoAThlsy5bHID1/oRftJt0T0BS +kHbTD0tTUt3QDV51FoLBjvXfjRRb8xJ+wIGJ0NzOscWgjgu6JPUysHEJD3+vSOKN +X3qJd3zcoYqswcvuhoVE2cFrSaZKEyIi1pJVr9CGItQTWXIisgdXdGYTnBdZU8jq +iJGaI1BXiNUl/p/21JA32T+ZD7cdMtx6KiuoKlY7Bzgj7Qk3XW7xsQsYu724LIJT +pVhIxntMrQSak7wIaqNPGR/FgkkKDsoo6iCHXlGxXv6tLg7pnioZIaHhc5+UZqmT +8I0UogWhQZS03/nwFRVDLPp+ka2P0g2gsm/dX1UVuucMT+hGeqn2c/iaSU76duoR +qavRPjLPJDnfVrpXhpqco9rq1+UwA/1uSNe0cFX0ArX040hCReDsMphcxgrkZ0sD +u71Px2ZLE5rpWmFd8LD0X2y1l4OEcTmoTPUtJxHlVrMFztuNbAlRnyCxTV8c2uId +zN44wRj6c2ZEV/w+kBVTV+L7NSt1eHDZ5tgUL7boEOylEgkHTl30aZ8nV2wvpaM3 +1Y/IwBnGmI4iNLMnRoIDlac6rR3dMUS4gtH+lkfxlBri9Qc3Qso= +=8LlB +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:15.mqueuefs.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:15.mqueuefs.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,138 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:15.mqueuefs Security Advisory + The FreeBSD Project + +Topic: Reference count overflow in mqueue filesystem + +Category: core +Module: kernel +Announced: 2019-07-24 +Credits: Mateusz Guzik +Affects: All supported versions of FreeBSD. +Corrected: 2019-07-23 21:12:32 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:55:16 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-23 21:15:28 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:55:16 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:55:16 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-5603 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +mqueuefs(5) implements POSIX message queue file system which can be used +by processes as a communication mechanism. + +'struct file' represents open files, directories, sockets and other +entities. + +II. Problem Description + +System calls operating on file descriptors obtain a reference to +relevant struct file which due to a programming error was not always put +back, which in turn could be used to overflow the counter of affected +struct file. + +III. Impact + +A local user can use this flaw to obtain access to files, directories, +sockets etc. opened by processes owned by other users. If obtained +struct file represents a directory from outside of user's jail, it can +be used to access files outside of the jail. If the user in question is +a jailed root they can obtain root privileges on the host system. + +IV. Workaround + +No workaround is available. Note that the mqueuefs file system is not +enabled by default. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-19:15/mqueuefs.patch +# fetch https://security.FreeBSD.org/patches/SA-19:15/mqueuefs.patch.asc +# gpg --verify mqueuefs.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r350261 +releng/12.0/ r350284 +stable/11/ r350263 +releng/11.2/ r350284 +releng/11.3/ r350284 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WmdfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIWpBAAg9BmPamkj7wLJODR8SvNk+qYqEbYeakiSGnvXllz2l+qI2dhMVsuQRGQ +ko7VY0P2Wuh68UiiDG63Oq3hbOWPPkL1axk6n275rZSdoVj856tjrHjnUtP3UX5S +WQUKRAREjhVjM9dAOwCYrmAmcpX4SkslklhfiR6AR62t4eptMlfJ6ACQATs6FPnX +WRdyDe7yq0mL4UHWg+PvotQ+rxGiynwgVRMXwaglKOldGOuPOeuj7azM4nb6/qkN +GjJlJOIRwfU1/sXVII3cCzndnCrz5A0sSttg4JK+uzneJNze+rOghGbyQ9F046z9 +H0M0Ae6M74UCyioyoTrQgvivWvATtNRkLBoRfvHQUNGSt6bS9g1F0N5J7NCgaIPx +vos7P4vnRM1avEAAnAhmm9eYAkO5VLmTb1ry5vOY1o2viesN3P0URcj7o+JIipaA +Kqlff154N2nJmCkT0BJ3m+80GWeAnwqli/LvAIruXxc2hqgWLh7wO+71mraPrV5Z +2+IiuLPMF18FdpTBjhXyX5zCtW7t7uARgZLJMjM+hTXc7aAer7746XY5JyXfRsa9 +jLVWHlff2YoF7DySyDIC7+ONfPIHGgr45imdJgJ9Cxu31ZBmCjesNR4x1DCKgLvT +KnpBvofWIkIb8sEikEnXMfrHqoP/RtVtK73GlmT7sbH9PDQPUYw= +=ehKK +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:16.bhyve.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:16.bhyve.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,135 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:16.bhyve Security Advisory + The FreeBSD Project + +Topic: Bhyve out-of-bounds read in XHCI device + +Category: core +Module: bhyve +Announced: 2019-07-24 +Credits: Reno Robert +Affects: All supported versions of FreeBSD. +Corrected: 2019-07-23 17:48:37 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:56:06 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-23 17:48:37 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:56:06 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:56:06 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-5604 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +bhyve(8) is a hypervisor that supports running a variety of virtual +machines (guests). bhyve includes an emulated XHCI device. + +II. Problem Description + +The pci_xhci_device_doorbell() function does not validate the 'epid' and +'streamid' provided by the guest, leading to an out-of-bounds read. + +III. Impact + +A misbehaving bhyve guest could crash the system or access memory that +it should not be able to. + +IV. Workaround + +No workaround is available, however systems not using bhyve(8) for +virtualization are not vulnerable. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +No reboot is required. Rather the bhyve(8) process for vulnerable virtual +machines should be restarted. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +Restart any bhyve virtual machines or reboot the system. + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-19:16/bhyve.patch +# fetch https://security.FreeBSD.org/patches/SA-19:16/bhyve.patch.asc +# gpg --verify bhyve.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart any bhyve virtual machines, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r350246 +releng/12.0/ r350285 +stable/11/ r350247 +releng/11.2/ r350285 +releng/11.3/ r350285 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WmtfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cI+Jw//TcrKrFaXkEJtqzspjoeK9YKwNwj30ewdb/Ph3GdcgVoQmfJVsWPcmcM9 ++dewKdl7gGLhVhoJ+3f3oFzlDcqSxFLHcNwSW5J7P8Zt+7ZpQzwH8pfB6S8T1Nk6 +77Sv5hYrjy8kdSh6Z/c8BkAQrhEFYO09xej8ekQ1B+iL2N4ErexpCNTMKlP96pGS +0/4tso5gdcwrc1t6HHGffFkjItgnE8Lvgr1ZsSHbcRGAc3nqy3n21U+VH+fecAzK +0NBO3HQeCbRIEdAms3jMLcAJGrs60VBN0nnWqLxlGBb10hY7Si0NkgbWOP2g/Elf +J+K4SHTFXbhIGrpsrEdvSVPvytQ8gKOSys5luvtLjt0Yhll08eEUDVzaIk//Hsak +BcUSlKHULLkVTJZvdZAHUMHJOMPpSAh61DuFcM+pxAt5E9rmgX+HnPBs1yLbgd23 +NaQadFC126T+AW5W5GyOs2BIEo4bdTNHqONF7gmR4a5bv6/7GWZz/QNsep43jDZH +43lur9mts+/1LUCD1s4DkMniNMaGt28GMNa44PgQVzHI7NU/gdVe25TLnAv+X9lO +aAkV/WAyszux/Io2G2DfJNTc8Am/xRzFBvmydOnbMtzw8X/xgxB1/0ysl51O9Bdw +OhfpMygAsxbG0e8y5VuhpuoHd8/vIoBmA0z+u1tt4zxJIXgqSgE= +=/161 +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-19:17.fd.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-19:17.fd.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,146 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-19:17.fd Security Advisory + The FreeBSD Project + +Topic: File description reference count leak + +Category: core +Module: unix +Announced: 2019-07-24 +Credits: Mark Johnston +Affects: All supported versions of FreeBSD. +Corrected: 2019-07-22 19:25:05 UTC (stable/12, 12.0-STABLE) + 2019-07-24 12:57:49 UTC (releng/12.0, 12.0-RELEASE-p8) + 2019-07-22 19:27:23 UTC (stable/11, 11.2-STABLE) + 2019-07-24 12:57:49 UTC (releng/11.2, 11.2-RELEASE-p12) + 2019-07-24 12:57:49 UTC (releng/11.3, 11.3-RELEASE-p1) +CVE Name: CVE-2019-5607 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +UNIX-domain sockets are used for inter-process communication. It is +possible to use UNIX-domain sockets to transfer rights, encoded as file +descriptors, to another process. Rights are encapsulated in control +messages, and multiple such messages may be transmitted with a single +system call. + +II. Problem Description + +If a process attempts to transmit rights over a UNIX-domain socket and +an error causes the attempt to fail, references acquired on the rights +are not released and are leaked. This bug can be used to cause the +reference counter to wrap around and free the corresponding file +structure. + +III. Impact + +A local user can exploit the bug to gain root privileges or escape from +a jail. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 11.2] +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.11.2.patch +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.11.2.patch.asc +# gpg --verify fd.11.2.patch.asc + +[FreeBSD 11.3] +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.11.patch +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.11.patch.asc +# gpg --verify fd.11.patch.asc + +[FreeBSD 12.0] +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.12.patch +# fetch https://security.FreeBSD.org/patches/SA-19:17/fd.12.patch.asc +# gpg --verify fd.12.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r350222 +releng/12.0/ r350286 +stable/11/ r350223 +releng/11.2/ r350286 +releng/11.3/ r350286 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl04WnBfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIOTQ/+KQMGXwNiuMVNib5ErewD9QdT48NYaU/hYUub3VMAfQltvWmbiPw7zXj7 +yJGm9FxWrMvZ6hFnKskV60u9d7PMYkOv4nzcaFgPoadByXXlALQGd/ansrZFyTJr +bDeBs7J3dM/VnH/lSlPc/LlbnH4iN+gj6SSqpsWAIdq99VIviAnzHTr7SniGfXul +hP+5+xSlfAYOKuH7jM1+gpuld9kR2QzGObiUJ6gfJk+I41C90tSJHb3v+DCanyrM +N2NXKbkgRtZoaIItiqZVIKHJP+VaHOnHCBq3uEbj2+OR7I5yFkDYdQbTiWVU1bl0 +9Ps/5LPDEiQYQqgCGadzZyqyEHvoPFy2vWvc1GFya6cV1L3gtM51C713ci2Xa3NK +ZknS4bIC2Nhtrf9PcFJRkMKW8OOdwYi/2vL9I4W/PAs2EV3thQivBB7dH9TYRTdC +BWP2tFM+isibjezJfj2RAjdAq0Kln0U+4AkNWgNNToyzSNFJ0LBtvzlgS7mmtuN0 +mA9n7tYyQM5vCXEQqcC3hIkJSeNE2Sj4/RVd8oo1Ngh1el0AFTJ2aq+QowG/lWO/ +pK1lvOQXMPElbSSxCytqALWY995VRxmEUO/TF6pCgsRDIXxx+eSf1XrtT2d1+Na7 +nzt511Ho9/F4Uwbih7u+IhnWReB2Da0djLBWUtOc+HsMLQZVAUk= +=juJj +-----END PGP SIGNATURE----- Added: head/share/security/patches/EN-19:13/mds.11.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-19:13/mds.11.patch Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,18 @@ +--- sys/x86/x86/cpu_machdep.c.orig ++++ sys/x86/x86/cpu_machdep.c +@@ -953,7 +953,6 @@ + * architectural state except possibly %rflags. Also, it is always + * called with interrupts disabled. + */ +-void (*mds_handler)(void); + void mds_handler_void(void); + void mds_handler_verw(void); + void mds_handler_ivb(void); +@@ -962,6 +961,7 @@ + void mds_handler_skl_avx(void); + void mds_handler_skl_avx512(void); + void mds_handler_silvermont(void); ++void (*mds_handler)(void) = mds_handler_void; + + static int + sysctl_hw_mds_disable_state_handler(SYSCTL_HANDLER_ARGS) Added: head/share/security/patches/EN-19:13/mds.11.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-19:13/mds.11.patch.asc Wed Jul 24 13:28:52 2019 (r53269) @@ -0,0 +1,18 @@ *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** From owner-svn-doc-all@freebsd.org Wed Jul 24 14:14:57 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 13E73AD88F; Wed, 24 Jul 2019 14:14:57 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B80B788A15; Wed, 24 Jul 2019 14:14:56 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 90463F907; Wed, 24 Jul 2019 14:14:56 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6OEEuYK023846; Wed, 24 Jul 2019 14:14:56 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6OEEuif023845; Wed, 24 Jul 2019 14:14:56 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201907241414.x6OEEuif023845@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Wed, 24 Jul 2019 14:14:56 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53270 - head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml X-SVN-Commit-Revision: 53270 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: B80B788A15 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.94 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.94)[-0.940,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Jul 2019 14:14:57 -0000 Author: gjb Date: Wed Jul 24 14:14:55 2019 New Revision: 53270 URL: https://svnweb.freebsd.org/changeset/doc/53270 Log: Document EN-19:13, SA-19:12-SA-19:17. Sponsored by: Rubicon Communications, LLC (Netgate) Modified: head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/security.xml Modified: head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml Wed Jul 24 13:28:52 2019 (r53269) +++ head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml Wed Jul 24 14:14:55 2019 (r53270) @@ -104,6 +104,14 @@ Timezone database information update + + + FreeBSD-EN-19:13.mds + 24 July 2019 + System crash from Intel CPU vulnerability + mitigation + Modified: head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/security.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/security.xml Wed Jul 24 13:28:52 2019 (r53269) +++ head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/security.xml Wed Jul 24 14:14:55 2019 (r53270) @@ -106,6 +106,41 @@ 2 July 2019 Privilege escalation in &man.cd.4; + + + FreeBSD-SA-19:12.telnet + 24 July 2019 + Multiple vulnerabilities + + + + FreeBSD-SA-19:13.pts + 24 July 2019 + Write-after-free vulnerability + + + + FreeBSD-SA-19:15.mqueuefs + 24 July 2019 + Reference count overflow + + + + FreeBSD-SA-19:16.bhyve + 24 July 2019 + &man.xhci.4; out-of-bounds read + + + + FreeBSD-SA-19:17.fd + 24 July 2019 + Reference count leak + From owner-svn-doc-all@freebsd.org Wed Jul 24 14:16:58 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 98FF6AD9AC; Wed, 24 Jul 2019 14:16:58 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 7A36588C1E; Wed, 24 Jul 2019 14:16:58 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 550D8F90A; Wed, 24 Jul 2019 14:16:58 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6OEGwpe024037; Wed, 24 Jul 2019 14:16:58 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6OEGwlQ024036; Wed, 24 Jul 2019 14:16:58 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201907241416.x6OEGwlQ024036@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Wed, 24 Jul 2019 14:16:58 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53271 - head/en_US.ISO8859-1/htdocs/releases/11.3R X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/releases/11.3R X-SVN-Commit-Revision: 53271 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 7A36588C1E X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.94 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.94)[-0.940,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Jul 2019 14:16:58 -0000 Author: gjb Date: Wed Jul 24 14:16:57 2019 New Revision: 53271 URL: https://svnweb.freebsd.org/changeset/doc/53271 Log: Regen after r350288. Sponsored by: Rubicon Communications, LLC (Netgate) Modified: head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html Modified: head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html Wed Jul 24 14:14:55 2019 (r53270) +++ head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html Wed Jul 24 14:16:57 2019 (r53271) @@ -35,7 +35,8 @@ errata are located at https://www.FreeBSD.org/releases/, plus any sites which keep up-to-date mirrors of this location.

    Source and binary snapshots of FreeBSD 11.3-STABLE also contain up-to-date copies of this document (as of the time of - the snapshot).

    For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/.

    2. Security Advisories

    AdvisoryDateTopic
    No advisories.  

    3. Errata Notices

    ErrataDateTopic
    No errata notices.  

    4. Open Issues

    2. Security Advisories

    AdvisoryDateTopic
    FreeBSD-SA-19:12.telnet24 July 2019

    Multiple vulnerabilities

    FreeBSD-SA-19:13.pts24 July 2019

    Write-after-free vulnerability

    FreeBSD-SA-19:14.freebsd3224 July 2019

    Kernel memory disclosure

    FreeBSD-SA-19:15.mqueuefs24 July 2019

    Reference count overflow

    FreeBSD-SA-19:16.bhyve24 July 2019

    xhci(4) out-of-bounds read

    FreeBSD-SA-19:17.fd24 July 2019

    Reference count leak

    3. Errata Notices

    ErrataDateTopic
    FreeBSD-EN-19:13.mds24 July 2019

    System crash from Intel CPU vulnerability + mitigation

    4. Open Issues

    • [2019-07-04] An issue which can cause a crash when connecting to a bhyve(4) instance with a VNC client under certain circumstances had been reported. An errata notice is planned From owner-svn-doc-all@freebsd.org Wed Jul 24 19:43:57 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 29E72B69A4; Wed, 24 Jul 2019 19:43:57 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0B64770731; Wed, 24 Jul 2019 19:43:57 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id D4A401B62C; Wed, 24 Jul 2019 19:43:56 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6OJhu8j020997; Wed, 24 Jul 2019 19:43:56 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6OJhuNF020996; Wed, 24 Jul 2019 19:43:56 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201907241943.x6OJhuNF020996@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Wed, 24 Jul 2019 19:43:56 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53272 - head/de_DE.ISO8859-1/books/handbook/basics X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/basics X-SVN-Commit-Revision: 53272 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 0B64770731 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.94 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.94)[-0.944,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Jul 2019 19:43:57 -0000 Author: bhd Date: Wed Jul 24 19:43:56 2019 New Revision: 53272 URL: https://svnweb.freebsd.org/changeset/doc/53272 Log: Update to r52957: Hint switch between virtual terminals from Xorg Modified: head/de_DE.ISO8859-1/books/handbook/basics/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/basics/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/basics/chapter.xml Wed Jul 24 14:16:57 2019 (r53271) +++ head/de_DE.ISO8859-1/books/handbook/basics/chapter.xml Wed Jul 24 19:43:56 2019 (r53272) @@ -5,7 +5,7 @@ $FreeBSD$ $FreeBSDde$ - basiert auf: r51390 + basiert auf: r52957 --> für die erste virtuelle Konsole (ttyv1, AltF3 für die zweite virtuelle Konsole (ttyv2, - und so weiter. + und so weiter. Wenn Sie &xorg; als + graphische Oberfläche benutzen, können Sie mit + StrgAltF1 + zur virtuellen Konsole zurückkehren. Beim Wechsel von einer Konsole zur nächsten wird die Bildschirmausgabe von &os; verwaltet. Dies erzeugt die From owner-svn-doc-all@freebsd.org Wed Jul 24 19:46:18 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 61792B69EC; Wed, 24 Jul 2019 19:46:18 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3DED67085A; Wed, 24 Jul 2019 19:46:18 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 1B3791B62F; Wed, 24 Jul 2019 19:46:18 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6OJkHaU021174; Wed, 24 Jul 2019 19:46:17 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6OJkHUU021173; Wed, 24 Jul 2019 19:46:17 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201907241946.x6OJkHUU021173@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Wed, 24 Jul 2019 19:46:17 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53273 - head/de_DE.ISO8859-1/books/handbook/firewalls X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/firewalls X-SVN-Commit-Revision: 53273 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 3DED67085A X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.94 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.94)[-0.944,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Jul 2019 19:46:18 -0000 Author: bhd Date: Wed Jul 24 19:46:17 2019 New Revision: 53273 URL: https://svnweb.freebsd.org/changeset/doc/53273 Log: Update to r52944: Revert a sysrc to an echo as it due to invalid characters. Modified: head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Jul 24 19:43:56 2019 (r53272) +++ head/de_DE.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Jul 24 19:46:17 2019 (r53273) @@ -5,7 +5,7 @@ $FreeBSD$ $FreeBSDde: de-docproj/books/handbook/firewalls/chapter.xml,v 1.53 2012/04/30 16:15:52 bcr Exp $ - basiert auf: r52936 + basiert auf: r52944 --> /etc/sysctl.conf fest: - &prompt.root; sysrc -f /etc/sysctl.conf net.inet.ip.fw.verbose_limit=5 + &prompt.root; echo "net.inet.ip.fw.verbose_limit=5" >> /etc/sysctl.conf Um die Protokollierung über die spezielle Schnittstelle ipfw0 zu aktivieren, fügen Sie stattdessen From owner-svn-doc-all@freebsd.org Thu Jul 25 01:48:59 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1264DBFAE2; Thu, 25 Jul 2019 01:48:59 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id E72B688965; Thu, 25 Jul 2019 01:48:58 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id C03E81F7D6; Thu, 25 Jul 2019 01:48:58 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6P1mw8D033916; Thu, 25 Jul 2019 01:48:58 GMT (envelope-from linimon@FreeBSD.org) Received: (from linimon@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6P1mwPu033915; Thu, 25 Jul 2019 01:48:58 GMT (envelope-from linimon@FreeBSD.org) Message-Id: <201907250148.x6P1mwPu033915@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: linimon set sender to linimon@FreeBSD.org using -f From: Mark Linimon Date: Thu, 25 Jul 2019 01:48:58 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53274 - head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Group: doc-head X-SVN-Commit-Author: linimon X-SVN-Commit-Paths: head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Commit-Revision: 53274 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: E72B688965 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.92 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.92)[-0.916,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 Jul 2019 01:48:59 -0000 Author: linimon Date: Thu Jul 25 01:48:58 2019 New Revision: 53274 URL: https://svnweb.freebsd.org/changeset/doc/53274 Log: Fix formatting problem with OSVERSION 1300036 entry. Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Jul 24 19:46:17 2019 (r53273) +++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Thu Jul 25 01:48:58 2019 (r53274) @@ -383,8 +383,8 @@ is spelled &, < is < and > is >. 349972 July 13, 2019 13.0-CURRENT after adding arm_drain_writebuf() and - arm_sync_icache() for compatibility with NetBSD and - OpenBSD. + arm_sync_icache() for compatibility with NetBSD and + OpenBSD. From owner-svn-doc-all@freebsd.org Thu Jul 25 01:53:45 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7C6A9BFC90; Thu, 25 Jul 2019 01:53:45 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 535CD88D01; Thu, 25 Jul 2019 01:53:45 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 00EF01F991; Thu, 25 Jul 2019 01:53:45 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6P1riod039805; Thu, 25 Jul 2019 01:53:44 GMT (envelope-from linimon@FreeBSD.org) Received: (from linimon@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6P1riVY039804; Thu, 25 Jul 2019 01:53:44 GMT (envelope-from linimon@FreeBSD.org) Message-Id: <201907250153.x6P1riVY039804@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: linimon set sender to linimon@FreeBSD.org using -f From: Mark Linimon Date: Thu, 25 Jul 2019 01:53:44 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53275 - head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Group: doc-head X-SVN-Commit-Author: linimon X-SVN-Commit-Paths: head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Commit-Revision: 53275 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 535CD88D01 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.92 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.92)[-0.916,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 Jul 2019 01:53:45 -0000 Author: linimon Date: Thu Jul 25 01:53:44 2019 New Revision: 53275 URL: https://svnweb.freebsd.org/changeset/doc/53275 Log: Document OSVERSION 1300037. Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Thu Jul 25 01:48:58 2019 (r53274) +++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Thu Jul 25 01:53:44 2019 (r53275) @@ -386,6 +386,13 @@ is spelled &, < is < and > is >. arm_sync_icache() for compatibility with NetBSD and OpenBSD. + + + 1300037 + 350307 + July 24, 2019 + 13.0-CURRENT after removal of libcap_random(3). + From owner-svn-doc-all@freebsd.org Thu Jul 25 18:00:08 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AD283AA37A; Thu, 25 Jul 2019 18:00:08 +0000 (UTC) (envelope-from emaste@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 8E69F8DA5D; Thu, 25 Jul 2019 18:00:08 +0000 (UTC) (envelope-from emaste@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 697B02630; Thu, 25 Jul 2019 18:00:08 +0000 (UTC) (envelope-from emaste@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6PI08an005263; Thu, 25 Jul 2019 18:00:08 GMT (envelope-from emaste@FreeBSD.org) Received: (from emaste@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6PI08fG005262; Thu, 25 Jul 2019 18:00:08 GMT (envelope-from emaste@FreeBSD.org) Message-Id: <201907251800.x6PI08fG005262@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: emaste set sender to emaste@FreeBSD.org using -f From: Ed Maste Date: Thu, 25 Jul 2019 18:00:08 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53276 - head/en_US.ISO8859-1/htdocs/security X-SVN-Group: doc-head X-SVN-Commit-Author: emaste X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/security X-SVN-Commit-Revision: 53276 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 8E69F8DA5D X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.97 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.97)[-0.966,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 Jul 2019 18:00:08 -0000 Author: emaste (src committer) Date: Thu Jul 25 18:00:08 2019 New Revision: 53276 URL: https://svnweb.freebsd.org/changeset/doc/53276 Log: advisory-template: add 11.3 to the correction details section Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/htdocs/security/advisory-template.txt Modified: head/en_US.ISO8859-1/htdocs/security/advisory-template.txt ============================================================================== --- head/en_US.ISO8859-1/htdocs/security/advisory-template.txt Thu Jul 25 01:53:44 2019 (r53275) +++ head/en_US.ISO8859-1/htdocs/security/advisory-template.txt Thu Jul 25 18:00:08 2019 (r53276) @@ -118,6 +118,7 @@ Branch/path stable/12/ rXXXXXX releng/12.0/ rXXXXXX stable/11/ rXXXXXX +releng/11.3/ rXXXXXX releng/11.2/ rXXXXXX ------------------------------------------------------------------------- From owner-svn-doc-all@freebsd.org Thu Jul 25 20:31:35 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 41BA4ADD6B; Thu, 25 Jul 2019 20:31:35 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id EA9A794228; Thu, 25 Jul 2019 20:31:34 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id C6986441C; Thu, 25 Jul 2019 20:31:34 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6PKVYJG094529; Thu, 25 Jul 2019 20:31:34 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6PKVYfC094528; Thu, 25 Jul 2019 20:31:34 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201907252031.x6PKVYfC094528@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Thu, 25 Jul 2019 20:31:34 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53277 - head/de_DE.ISO8859-1/books/handbook/printing X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/printing X-SVN-Commit-Revision: 53277 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: EA9A794228 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.96 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.96)[-0.965,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 Jul 2019 20:31:35 -0000 Author: bhd Date: Thu Jul 25 20:31:34 2019 New Revision: 53277 URL: https://svnweb.freebsd.org/changeset/doc/53277 Log: Update to r53110: Chase rename of ghostscript in the printing chapter. Modified: head/de_DE.ISO8859-1/books/handbook/printing/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/printing/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/printing/chapter.xml Thu Jul 25 18:00:08 2019 (r53276) +++ head/de_DE.ISO8859-1/books/handbook/printing/chapter.xml Thu Jul 25 20:31:34 2019 (r53277) @@ -4,7 +4,7 @@ The FreeBSD German Documentation Project $FreeBSD$ $FreeBSDde: de-docproj/books/handbook/printing/chapter.xml,v 1.56 2012/02/16 20:07:18 bcr Exp $ - basiert auf: r48095 + basiert auf: r53110 --> PCL oder PCL5 - print/ghostscript9 + print/ghostscript9-base -sDEVICE=ljet4 für Schwarzweiß, -sDEVICE=cljet5 für Farbe @@ -383,7 +383,7 @@ Starting lpd. PCLXL oder PCL6 - print/ghostscript9 + print/ghostscript9-base -sDEVICE=pxlmono für Schwarzweiß, -sDEVICE=pxlcolor für Farbe @@ -391,7 +391,7 @@ Starting lpd. ESC/P2 - print/ghostscript9 + print/ghostscript9-base -sDEVICE=uniprint @@ -410,7 +410,7 @@ Starting lpd. Um die Konfiguration einfach zu halten, wählen Sie einen Drucker, der &postscript; oder auch PCL - unterstützt. Mit print/ghostscript können + unterstützt. Mit print/ghostscript9-base können diese Drucker &postscript; nativ verstehen. Wenn der Drucker &postscript; oder PCL direkt unterstützt, können Sie auch sofort einfache @@ -420,7 +420,7 @@ Starting lpd. unterstützen in der Regel kein &postscript; oder PCL. Dennoch können Sie ASCII-Textdateien drucken. - print/ghostscript unterstützt die Sprachen + print/ghostscript9-base unterstützt die Sprachen dieser Drucker. Jedoch ist der Druck von Grafiken auf diesen Druckern oft sehr langsam, da aufgrund der großen Menge an Daten übertragen und ausgedruckt werden müssen. @@ -772,7 +772,7 @@ CR=$'\r' wandelt &postscript;-Dateien in PCL um, bevor die Datei an den Drucker geschickt wird. Installieren Sie den Ghostscript &postscript; Interpreter - print/ghostscript9 aus der + print/ghostscript9-base aus der Ports-Sammlung. Erstellen Sie From owner-svn-doc-all@freebsd.org Fri Jul 26 17:55:29 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C253EA5BAB; Fri, 26 Jul 2019 17:55:29 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 720D573668; Fri, 26 Jul 2019 17:55:29 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 472531ACBF; Fri, 26 Jul 2019 17:55:29 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6QHtTSS053779; Fri, 26 Jul 2019 17:55:29 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6QHtT9t053778; Fri, 26 Jul 2019 17:55:29 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201907261755.x6QHtT9t053778@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Fri, 26 Jul 2019 17:55:29 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53278 - head/de_DE.ISO8859-1/books/handbook/virtualization X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/virtualization X-SVN-Commit-Revision: 53278 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 720D573668 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.96 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.96)[-0.961,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 26 Jul 2019 17:55:29 -0000 Author: bhd Date: Fri Jul 26 17:55:28 2019 New Revision: 53278 URL: https://svnweb.freebsd.org/changeset/doc/53278 Log: typo: mount_vboxfs -> mount_vboxvfs Modified: head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml Thu Jul 25 20:31:34 2019 (r53277) +++ head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml Fri Jul 26 17:55:28 2019 (r53278) @@ -890,7 +890,7 @@ EndSection </deviceinfo> Gemeinsame Ordner für die Dateitransfer zwischen Host und VM - sind verfügbar, wenn sie mit mount_vboxfs + sind verfügbar, wenn sie mit mount_vboxvfs eingebunden werden. Ein gemeinsamer Ordner kann auf dem Host über die graphische Oberfläche von VirtualBox oder mit vboxmanage erstellt werden. Um From owner-svn-doc-all@freebsd.org Sat Jul 27 11:41:33 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1CADFB6FBF; Sat, 27 Jul 2019 11:41:33 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0050677B26; Sat, 27 Jul 2019 11:41:33 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id CF7C526B52; Sat, 27 Jul 2019 11:41:32 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6RBfWmi065614; Sat, 27 Jul 2019 11:41:32 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6RBfW1o065613; Sat, 27 Jul 2019 11:41:32 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201907271141.x6RBfW1o065613@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Sat, 27 Jul 2019 11:41:32 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53279 - head/en_US.ISO8859-1/books/handbook/printing X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/en_US.ISO8859-1/books/handbook/printing X-SVN-Commit-Revision: 53279 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 0050677B26 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.91 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.91)[-0.908,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 27 Jul 2019 11:41:33 -0000 Author: bhd Date: Sat Jul 27 11:41:32 2019 New Revision: 53279 URL: https://svnweb.freebsd.org/changeset/doc/53279 Log: Fix name of the ghostscript port. Modified: head/en_US.ISO8859-1/books/handbook/printing/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/printing/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/printing/chapter.xml Fri Jul 26 17:55:28 2019 (r53278) +++ head/en_US.ISO8859-1/books/handbook/printing/chapter.xml Sat Jul 27 11:41:32 2019 (r53279) @@ -366,7 +366,7 @@ Starting lpd. ESC/P2 print/ghostscript9--base + role="port">print/ghostscript9-base -sDEVICE=uniprint From owner-svn-doc-all@freebsd.org Sat Jul 27 16:21:46 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6249BBD13B; Sat, 27 Jul 2019 16:21:46 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 441158BB64; Sat, 27 Jul 2019 16:21:46 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id E03B91FBD; Sat, 27 Jul 2019 16:21:45 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6RGLjS8040516; Sat, 27 Jul 2019 16:21:45 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6RGLj7X040515; Sat, 27 Jul 2019 16:21:45 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201907271621.x6RGLj7X040515@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Sat, 27 Jul 2019 16:21:45 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53280 - head/de_DE.ISO8859-1/books/handbook/jails X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/jails X-SVN-Commit-Revision: 53280 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 441158BB64 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.95)[-0.945,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 27 Jul 2019 16:21:46 -0000 Author: bhd Date: Sat Jul 27 16:21:45 2019 New Revision: 53280 URL: https://svnweb.freebsd.org/changeset/doc/53280 Log: Update to r53124: Add a small section about fetching the archive files directly when jails are created. Modified: head/de_DE.ISO8859-1/books/handbook/jails/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/jails/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/jails/chapter.xml Sat Jul 27 11:41:32 2019 (r53279) +++ head/de_DE.ISO8859-1/books/handbook/jails/chapter.xml Sat Jul 27 16:21:45 2019 (r53280) @@ -5,7 +5,7 @@ $FreeBSD$ $FreeBSDde: de-docproj/books/handbook/jails/chapter.xml,v 1.23 2011/05/25 20:42:25 jkois Exp $ - basiert auf: r51462 + basiert auf: r53124 --> - &prompt.root; mount -t cd9660 /dev/`mdconfig -f cdimage.iso` /mnt + &prompt.root; mount -t cd9660 /dev/`mdconfig -f cdimage.iso` /mnt +&prompt.root; cd /mnt/usr/freebsd-dist/ + Alternativ kann der Tarball auch von einem Spiegel herunter + geladen werden: + + &prompt.root; sh +&prompt.root; export DESTRELEASE=12.0-RELEASE +&prompt.root; export DESTARCH=`uname -m` +&prompt.root; export SOURCEURL=http://ftp.freebsd.org/pub/FreeBSD/releases/$DESTARCH/$DESTRELEASE/ +&prompt.root; for set in base ports; do fetch $SOURCEURL/$set.txz ; done + Extrahieren Sie die Binärdateien aus den Archiven des Installationsmediums in das entsprechende Verzeichnis. Es wird mindestens das base-Set benötigt, aber Sie können auch eine komplette Installation durchführen, wenn Sie dies bevorzugen. - Um lediglich das Basissystem zu installieren, führen Sie die - nachstehenden Kommandos aus: + Um lediglich das Basissystem zu installieren, führen Sie + dieses Kommando aus: - &prompt.root; tar -xf /mnt/freebsd_install/usr/freebsd-dist/base.txz -C $DESTDIR + &prompt.root; tar -xf base.txz -C $DESTDIR - Führen Sie folgendes Kommando in &man.sh.1; aus, um alles + Führen Sie folgendes Kommando aus, um alles außer den Kernel zu installieren: - &prompt.root; for set in BASE PORTS; do tar -xf /mnt/usr/freebsd-dist/$set.txz -C $DESTDIR ; done + &prompt.root; for set in base ports; do tar -xf $set.txz -C $DESTDIR ; done Die Manualpage &man.jail.8; beschreibt die Erstellung einer Jail wie folgt: From owner-svn-doc-all@freebsd.org Sat Jul 27 16:29:39 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5788BBD250; Sat, 27 Jul 2019 16:29:39 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 33F688BE37; Sat, 27 Jul 2019 16:29:39 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0C8B3200E; Sat, 27 Jul 2019 16:29:39 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6RGTcv6042335; Sat, 27 Jul 2019 16:29:38 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6RGTcv7042334; Sat, 27 Jul 2019 16:29:38 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201907271629.x6RGTcv7042334@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Sat, 27 Jul 2019 16:29:38 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53281 - head/de_DE.ISO8859-1/books/handbook/linuxemu X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/linuxemu X-SVN-Commit-Revision: 53281 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 33F688BE37 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.93 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.93)[-0.931,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 27 Jul 2019 16:29:39 -0000 Author: bhd Date: Sat Jul 27 16:29:38 2019 New Revision: 53281 URL: https://svnweb.freebsd.org/changeset/doc/53281 Log: Update to r50370: Remove two lines that are no longer needed. Modified: head/de_DE.ISO8859-1/books/handbook/linuxemu/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/linuxemu/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/linuxemu/chapter.xml Sat Jul 27 16:21:45 2019 (r53280) +++ head/de_DE.ISO8859-1/books/handbook/linuxemu/chapter.xml Sat Jul 27 16:29:38 2019 (r53281) @@ -5,7 +5,7 @@ $FreeBSD$ $FreeBSDde: de-docproj/books/handbook/linuxemu/chapter.xml,v 1.94 2012/04/30 17:13:51 bcr Exp $ - basiert auf: r49367 + basiert auf: r50370 --> @@ -140,9 +140,7 @@ Id Refs Address Size Name emulators/linux_base-c6. So installieren Sie das Paket: - &prompt.root; printf "compat.linux.osrelease=2.6.18\n" >> /etc/sysctl.conf -&prompt.root; sysctl compat.linux.osrelease=2.6.18 -&prompt.root; pkg install emulators/linux_base-c6 + &prompt.root; pkg install emulators/linux_base-c6 Wollen Sie die &linux;-Binärkompatibilität beim Systemstart aktivieren, fügen Sie folgende Zeile in From owner-svn-doc-all@freebsd.org Sat Jul 27 19:00:05 2019 Return-Path: Delivered-To: svn-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A3F71C0054; Sat, 27 Jul 2019 19:00:05 +0000 (UTC) (envelope-from jkois@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 768416A8F6; Sat, 27 Jul 2019 19:00:05 +0000 (UTC) (envelope-from jkois@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 1B4883D09; Sat, 27 Jul 2019 19:00:05 +0000 (UTC) (envelope-from jkois@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x6RJ04hP031842; Sat, 27 Jul 2019 19:00:04 GMT (envelope-from jkois@FreeBSD.org) Received: (from jkois@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x6RJ04L8031841; Sat, 27 Jul 2019 19:00:04 GMT (envelope-from jkois@FreeBSD.org) Message-Id: <201907271900.x6RJ04L8031841@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: jkois set sender to jkois@FreeBSD.org using -f From: Johann Kois Date: Sat, 27 Jul 2019 19:00:04 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53282 - head/de_DE.ISO8859-1/share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: jkois X-SVN-Commit-Paths: head/de_DE.ISO8859-1/share/xml X-SVN-Commit-Revision: 53282 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 768416A8F6 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.97 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.97)[-0.965,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: svn-doc-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "SVN commit messages for the entire doc trees \(except for " user" , " projects" , and " translations" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 27 Jul 2019 19:00:05 -0000 Author: jkois Date: Sat Jul 27 19:00:04 2019 New Revision: 53282 URL: https://svnweb.freebsd.org/changeset/doc/53282 Log: r53235 -> r53260 MFde: resync the project news page. Modified: head/de_DE.ISO8859-1/share/xml/news.xml Modified: head/de_DE.ISO8859-1/share/xml/news.xml ============================================================================== --- head/de_DE.ISO8859-1/share/xml/news.xml Sat Jul 27 16:29:38 2019 (r53281) +++ head/de_DE.ISO8859-1/share/xml/news.xml Sat Jul 27 19:00:04 2019 (r53282) @@ -4,7 +4,7 @@