git: 34e274ecb6 - main - Add EN-23:09 through EN-23:11, SA-23:10 and SA-23:11.

From: Gordon Tetlow <gordon_at_FreeBSD.org>
Date: Wed, 06 Sep 2023 18:09:32 UTC
The branch main has been updated by gordon:

URL: https://cgit.FreeBSD.org/doc/commit/?id=34e274ecb61085e2a699f1ddbe0c6a37b6d7489a

commit 34e274ecb61085e2a699f1ddbe0c6a37b6d7489a
Author:     Gordon Tetlow <gordon@FreeBSD.org>
AuthorDate: 2023-09-06 18:08:43 +0000
Commit:     Gordon Tetlow <gordon@FreeBSD.org>
CommitDate: 2023-09-06 18:08:43 +0000

    Add EN-23:09 through EN-23:11, SA-23:10 and SA-23:11.
    
    Approved by:    so
---
 website/data/security/advisories.toml              |    8 +
 website/data/security/errata.toml                  |   12 +
 .../advisories/FreeBSD-EN-23:09.freebsd-update.asc |  127 ++
 .../security/advisories/FreeBSD-EN-23:10.pci.asc   |  129 ++
 .../advisories/FreeBSD-EN-23:11.caroot.asc         |  125 ++
 .../security/advisories/FreeBSD-SA-23:10.pf.asc    |  164 ++
 .../security/advisories/FreeBSD-SA-23:11.wifi.asc  |  153 ++
 .../security/patches/EN-23:09/freebsd-update.patch |   54 +
 .../patches/EN-23:09/freebsd-update.patch.asc      |   16 +
 website/static/security/patches/EN-23:10/pci.patch |   56 +
 .../static/security/patches/EN-23:10/pci.patch.asc |   16 +
 .../static/security/patches/EN-23:11/caroot.patch  | 2119 ++++++++++++++++++++
 .../security/patches/EN-23:11/caroot.patch.asc     |   16 +
 .../static/security/patches/SA-23:10/pf.12.patch   |   29 +
 .../security/patches/SA-23:10/pf.12.patch.asc      |   16 +
 .../static/security/patches/SA-23:10/pf.13.patch   |   29 +
 .../security/patches/SA-23:10/pf.13.patch.asc      |   16 +
 .../static/security/patches/SA-23:11/wifi.patch    |   34 +
 .../security/patches/SA-23:11/wifi.patch.asc       |   16 +
 19 files changed, 3135 insertions(+)

diff --git a/website/data/security/advisories.toml b/website/data/security/advisories.toml
index 2d5b3077f7..9fb568085e 100644
--- a/website/data/security/advisories.toml
+++ b/website/data/security/advisories.toml
@@ -1,6 +1,14 @@
 # Sort advisories by year, month and day
 # $FreeBSD$
 
+[[advisories]]
+name = "FreeBSD-SA-23:11.wifi"
+date = "2023-09-06"
+
+[[advisories]]
+name = "FreeBSD-SA-23:10.pf"
+date = "2023-09-06"
+
 [[advisories]]
 name = "FreeBSD-SA-23:09.pam_krb5"
 date = "2023-08-01"
diff --git a/website/data/security/errata.toml b/website/data/security/errata.toml
index 0fccd5baf3..b9b5b054e0 100644
--- a/website/data/security/errata.toml
+++ b/website/data/security/errata.toml
@@ -1,6 +1,18 @@
 # Sort errata notices by year, month and day
 # $FreeBSD$
 
+[[notices]]
+name = "FreeBSD-EN-23:11.caroot"
+date = "2023-09-06"
+
+[[notices]]
+name = "FreeBSD-EN-23:10.pci"
+date = "2023-09-06"
+
+[[notices]]
+name = "FreeBSD-EN-23:09.freebsd-update"
+date = "2023-09-06"
+
 [[notices]]
 name = "FreeBSD-EN-23:08.vnet"
 date = "2023-08-01"
diff --git a/website/static/security/advisories/FreeBSD-EN-23:09.freebsd-update.asc b/website/static/security/advisories/FreeBSD-EN-23:09.freebsd-update.asc
new file mode 100644
index 0000000000..9f2d14fb2b
--- /dev/null
+++ b/website/static/security/advisories/FreeBSD-EN-23:09.freebsd-update.asc
@@ -0,0 +1,127 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-EN-23:09.freebsd-update                                 Errata Notice
+                                                          The FreeBSD Project
+
+Topic:          freebsd-update incorrectly merges files on upgrade
+
+Category:       core
+Module:         freebsd-update
+Announced:      2023-09-06
+Affects:        FreeBSD 13.2
+Corrected:      2023-05-16 21:34:10 UTC (stable/13, 13.2-STABLE)
+                2023-09-06 16:56:24 UTC (releng/13.2, 13.2-RELEASE-p3)
+
+For general information regarding FreeBSD Errata Notices and Security
+Advisories, including descriptions of the fields above, security
+branches, and the following sections, please visit
+<URL:https://security.FreeBSD.org/>.
+
+I.   Background
+
+freebsd-update provides binary updates for supported releases of FreeBSD on
+amd64, arm64, and i386.
+
+II.  Problem Description
+
+freebsd-update incorrectly deleted files in /etc/ in the event the file to be
+updated matched the new release and was different than the old release.  This
+has not been an issue previously because the $FreeBSD$ tag expansion from
+subversion virtually guaranteed the existing file was going to be different
+from the new release. With the conversion to git in the 13.x releases,
+$FreeBSD$ is no longer expanded, making it much more likely that a file would
+find this issue.
+
+III. Impact
+
+Unmodified files in /etc/ may be deleted on running freebsd-update upgrade.
+
+IV.  Workaround
+
+No workaround is available.
+
+V.   Solution
+
+Upgrade your system to a supported FreeBSD stable or release / security
+branch (releng) dated after the correction date.
+
+Perform one of the following:
+
+1) To update your system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the amd64, i386, or
+(on FreeBSD 13 and later) arm64 platforms can be updated via the
+freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+2) To update your system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch https://security.FreeBSD.org/patches/EN-23:09/freebsd-update.patch
+# fetch https://security.FreeBSD.org/patches/EN-23:09/freebsd-update.patch.asc
+# gpg --verify freebsd-update.patch.asc
+
+b) Apply the patch.  Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile the operating system using buildworld and installworld as
+described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
+
+VI.  Correction details
+
+This issue is corrected by the corresponding Git commit hash or Subversion
+revision number in the following stable and release branches:
+
+Branch/path                             Hash                     Revision
+- -------------------------------------------------------------------------
+stable/13/                              866e5c6b3ce7    stable/13-n255386
+releng/13.2/                            0b39d9de2e71  releng/13.2-n254628
+- -------------------------------------------------------------------------
+
+Run the following command to see which files were modified by a
+particular commit:
+
+# git show --stat <commit hash>
+
+Or visit the following URL, replacing NNNNNN with the hash:
+
+<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
+
+To determine the commit count in a working tree (for comparison against
+nNNNNNN in the table above), run:
+
+# git rev-list --count --first-parent HEAD
+
+VII. References
+
+<URL:https://reviews.freebsd.org/D39973>
+
+The latest revision of this advisory is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-23:09.freebsd-update.asc>
+-----BEGIN PGP SIGNATURE-----
+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+=GZ0v
+-----END PGP SIGNATURE-----
diff --git a/website/static/security/advisories/FreeBSD-EN-23:10.pci.asc b/website/static/security/advisories/FreeBSD-EN-23:10.pci.asc
new file mode 100644
index 0000000000..3755634e2d
--- /dev/null
+++ b/website/static/security/advisories/FreeBSD-EN-23:10.pci.asc
@@ -0,0 +1,129 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-EN-23:10.pci                                            Errata Notice
+                                                          The FreeBSD Project
+
+Topic:          PCI-e hot-plug is broken with certain devices
+
+Category:       core
+Module:         pci
+Announced:      2023-09-06
+Affects:        FreeBSD 13.2
+Corrected:      2023-06-28 01:32:47 UTC (stable/13, 13.2-STABLE)
+                2023-09-06 16:57:02 UTC (releng/13.2, 13.2-RELEASE-p3)
+
+For general information regarding FreeBSD Errata Notices and Security
+Advisories, including descriptions of the fields above, security
+branches, and the following sections, please visit
+<URL:https://security.FreeBSD.org/>.
+
+I.   Background
+
+FreeBSD's pcib(4) PCI-e bridge driver implements support for hot-plugging PCIe
+devices.  When attaching to a hot-plug-capable slot, the pcib(4) driver
+allocates a MSI or MSI-X vector used to trigger handling of hot-plug
+events.
+
+II.  Problem Description
+
+The code which allocated the hot-plug interrupt did not allocate MSI-X
+vectors properly.  When attaching to devices which support only MSI-X
+messages, the interrupt would not be allocated.
+
+III. Impact
+
+PCIe hot-plug would fail to work for certain devices.  In particular,
+this affects certain Amazon EC2 instance types which require functional
+hot-plug support in order to attach network devices.
+
+IV.  Workaround
+
+No workaround is available for affected devices.
+
+V.   Solution
+
+Upgrade your system to a supported FreeBSD stable or release / security
+branch (releng) dated after the correction date and reboot.
+
+Perform one of the following:
+
+1) To update your system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the amd64, i386, or
+(on FreeBSD 13 and later) arm64 platforms can be updated via the
+freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+# shutdown -r +10min "Rebooting for an erratum update"
+
+2) To update your system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch https://security.FreeBSD.org/patches/EN-23:10/pci.patch
+# fetch https://security.FreeBSD.org/patches/EN-23:10/pci.patch.asc
+# gpg --verify pci.patch.asc
+
+b) Apply the patch.  Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile your kernel as described in
+<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
+system.
+
+VI.  Correction details
+
+This issue is corrected by the corresponding Git commit hash or Subversion
+revision number in the following stable and release branches:
+
+Branch/path                             Hash                     Revision
+- -------------------------------------------------------------------------
+stable/13/                              12ce57e6d3e7    stable/13-n255700
+releng/13.2/                            e80d2d894ff1  releng/13.2-n254629
+- -------------------------------------------------------------------------
+
+Run the following command to see which files were modified by a
+particular commit:
+
+# git show --stat <commit hash>
+
+Or visit the following URL, replacing NNNNNN with the hash:
+
+<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
+
+To determine the commit count in a working tree (for comparison against
+nNNNNNN in the table above), run:
+
+# git rev-list --count --first-parent HEAD
+
+VII. References
+
+<URL:https://reviews.freebsd.org/D40581>
+
+The latest revision of this advisory is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-23:10.pci.asc>
+-----BEGIN PGP SIGNATURE-----
+
+iQIyBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmT4vyUACgkQbljekB8A
+Gu9jsQ/3cpks/UuN/HHjGQdnqwRbwwMI44jysniwnetaXwZ+z6JoDQYFZyRFZGGb
+BKNo7asZlPgfrRYCqaZ3sH6pwzj7aU/ImLvQyLuTWo14C/29nM8koFi0vCGnJD/2
+oQK8GUZLR5PZfGIsW0swGcmPYQ7NQtBiBQj/B+xqpPIllIcrTK0vCyCf2JIIGohy
+o8YIvd//FOs738Yb8ZAX6wta3KUu92SiWZH49BI/dJjkXbXSfhshDupx9EP2cfx/
+uxYzdcEvLPWvpd0KaaVqbYMpw05wRt/23ir/E1fj4uDBL9tDWEgn150uqVbErm8F
+/W+gP9DMjkA6IlredXLD1Q0pZpUlo/CbjNQLpojQcJcuQhzcy7msb9TP6oHjW2Gi
+JRed3MqBWxrZJ/KdmCttC5qlzEPVq05aejRQXM1F3+FG/hUXo5a7tSUNvZ2LIQYC
+CW4C+AbWsQwzPUdRxidAhUflRBM95p8ifKZC8qWZ0f67FBYvo3OB0hGo+5PReimc
+fIzJDVL05/XgaXX2dH+sUjZO2PgG07Q343uVPCqYwFYPx43PMYlfWkqT99G1dleV
+rWryNrO3WtLpzxWmY15h8f1I4sq8E+8rboN/HdVZm6vCLSOqfvAbnAN5Kf/hWMRj
+logaqv/WE7DX3qpoY9eZ/foMvF72Q+FXJ5atSIWJX3w6UrzKRA==
+=N9UQ
+-----END PGP SIGNATURE-----
diff --git a/website/static/security/advisories/FreeBSD-EN-23:11.caroot.asc b/website/static/security/advisories/FreeBSD-EN-23:11.caroot.asc
new file mode 100644
index 0000000000..1deee71eb8
--- /dev/null
+++ b/website/static/security/advisories/FreeBSD-EN-23:11.caroot.asc
@@ -0,0 +1,125 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-EN-23:11.caroot                                         Errata Notice
+                                                          The FreeBSD Project
+
+Topic:          Root certificate bundle update
+
+Category:       core
+Module:         caroot
+Announced:      2023-09-06
+Affects:        FreeBSD 13.2
+Corrected:      2023-07-11 15:05:57 UTC (stable/13, 13.2-STABLE)
+                2023-09-06 16:57:41 UTC (releng/13.2, 13.2-RELEASE-p3)
+
+For general information regarding FreeBSD Errata Notices and Security
+Advisories, including descriptions of the fields above, security
+branches, and the following sections, please visit
+<URL:https://security.FreeBSD.org/>.
+
+I.   Background
+
+The root certificate bundle is the trust store that is used by OpenSSL
+programs and libraries to aid in determining whether it should trust a given
+TLS certificate.
+
+II.  Problem Description
+
+Several certificates were added to the bundle after the latest release of
+FreeBSD 13.2.
+
+III. Impact
+
+TLS connections using the missing root certificates as a trust anchor would
+not be trusted causing an error.
+
+IV.  Workaround
+
+No workaround is available. Software that uses an internal trust store is not
+affected.
+
+V.   Solution
+
+Upgrade your system to a supported FreeBSD stable or release / security
+branch (releng) dated after the correction date.
+
+Perform one of the following:
+
+1) To update your system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the amd64, i386, or
+(on FreeBSD 13 and later) arm64 platforms can be updated via the
+freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+2) To update your system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch https://security.FreeBSD.org/patches/EN-23:11/caroot.patch
+# fetch https://security.FreeBSD.org/patches/EN-23:11/caroot.patch.asc
+# gpg --verify caroot.patch.asc
+
+b) Apply the patch.  Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile the operating system using buildworld and installworld as
+described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
+
+Restart all daemons that use OpenSSL, or reboot the system.
+
+VI.  Correction details
+
+This issue is corrected by the corresponding Git commit hash or Subversion
+revision number in the following stable and release branches:
+
+Branch/path                             Hash                     Revision
+- -------------------------------------------------------------------------
+stable/13/                              565712db0dfa    stable/13-n255804
+releng/13.2/                            902c13c4cf68  releng/13.2-n254630
+- -------------------------------------------------------------------------
+
+Run the following command to see which files were modified by a
+particular commit:
+
+# git show --stat <commit hash>
+
+Or visit the following URL, replacing NNNNNN with the hash:
+
+<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
+
+To determine the commit count in a working tree (for comparison against
+nNNNNNN in the table above), run:
+
+# git rev-list --count --first-parent HEAD
+
+VII. References
+
+The latest revision of this advisory is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-23:11.caroot.asc>
+-----BEGIN PGP SIGNATURE-----
+
+iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmT4vycACgkQbljekB8A
+Gu+f5BAAytNLuwte1XCdFW+5I+4Y4TC2crzZ1Om3xmC9bp1DoI8oVaCO8m7bkUr5
+9K1afCqj8+rPt0uPUwyqONuVDSusQtmUte3mLUH78BStf0kLJDEUS4dLIUJ27liI
+CuBDsUyEK+bh8oiQhOmw7OqM+bZfpekTJbe6C/VuBDGBkCY4HNhjg5QHBehLFPxz
+oaCvNMJy/71kSPrgtqOGZJMEZ4LHmosJPu9mHzjCuwBBnzV+uCt7zvAnt2hybMt0
+itYaBlGX4r3NmknHDz271+1VT4xkfw01oN5FgsAYAezzaP71+nNgxmo0cAAfLs+0
+4mZ4O4LFMbXIdjqvxduqpX9BII8ZxU+XFE7hJRGyyENuROWBt0rs4e2/M5ljneew
+IhxTut38cBCHBwQgDFM84HeramYwYwx92LpkAxj+Honsn4V3e4aoygnpJJvYw0TR
+jqO5wBe8XKwUgBdf6Jttaz4JpPTxG2Sjf2yvJDD7Q5vrdu9kxjKS/X+5pJb+0xvp
+w1bSoPF+KtXTmr3sZJy018GT7v8LbvlNXSRZmciJEi3958MHOaLPdyqhqYnvear7
+Fk9GUzb182Zm0uNGDNqEg+kDUUSs9M6pEWbKa+hqyWg3M5ySgCiirpseQnneNN+K
+q6sSdlj25+12bIUMRLtb3WTSWM0/HsuxUo8YBNjmbpI/Uo7zEJ4=
+=QFAS
+-----END PGP SIGNATURE-----
diff --git a/website/static/security/advisories/FreeBSD-SA-23:10.pf.asc b/website/static/security/advisories/FreeBSD-SA-23:10.pf.asc
new file mode 100644
index 0000000000..cefc0c5999
--- /dev/null
+++ b/website/static/security/advisories/FreeBSD-SA-23:10.pf.asc
@@ -0,0 +1,164 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-SA-23:10.pf                                         Security Advisory
+                                                          The FreeBSD Project
+
+Topic:          pf incorrectly handles multiple IPv6 fragment headers
+
+Category:       core
+Module:         pf
+Announced:      2023-09-06
+Credits:        Enrico Bassetti bassetti@di.uniroma1.it
+                (NetSecurityLab @ Sapienza University of Rome)
+Affects:        All supported versions of FreeBSD.
+Corrected:      2023-08-04 14:08:05 UTC (stable/13, 13.2-STABLE)
+                2023-09-06 16:58:39 UTC (releng/13.2, 13.2-RELEASE-p3)
+                2023-08-04 14:14:08 UTC (stable/12, 12.4-STABLE)
+                2023-09-06 17:38:31 UTC (releng/12.4, 12.4-RELEASE-p5)
+CVE Name:       CVE-2023-4809
+
+For general information regarding FreeBSD Security Advisories,
+including descriptions of the fields above, security branches, and the
+following sections, please visit <URL:https://security.FreeBSD.org/>.
+
+I.   Background
+
+pf is an Internet Protocol packet filter originally written for OpenBSD.
+pf can reassemble fragmented IPv6 packets in order to apply rules on the
+reassembled packet. This allows pf to filter based on the upper layer
+protocol (e.g. TCP, UDP) information.
+
+IPv6 packets may be fragmented by the originating node, and will then contain
+a fragment extension header.  An IPv6 packet will normally contain only one
+fragment extension header.
+
+
+II.  Problem Description
+
+With a 'scrub fragment reassemble' rule, a packet containing multiple IPv6
+fragment headers would be reassembled, and then immediately processed.  That
+is, a packet with multiple fragment extension headers would not be recognized
+as the correct ultimate payload. Instead a packet with multiple IPv6 fragment
+headers would unexpectedly be interpreted as a fragmented packet, rather than
+as whatever the real payload is.
+
+III. Impact
+
+IPv6 fragments may bypass firewall rules written on the assumption all
+fragments have been reassembled and, as a result, be forwarded or processed
+by the host.
+
+IV.  Workaround
+
+No workaround is available but systems not using the pf firewall are not
+affected.
+
+V.   Solution
+
+Upgrade your vulnerable system to a supported FreeBSD stable or
+release / security branch (releng) dated after the correction date
+and reboot.
+
+Perform one of the following:
+
+1) To update your vulnerable system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the amd64, i386, or
+(on FreeBSD 13 and later) arm64 platforms can be updated via the
+freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+# shutdown -r +10min "Rebooting for a security update"
+
+2) To update your vulnerable system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+[FreeBSD 13.2]
+# fetch https://security.FreeBSD.org/patches/SA-23:10/pf.13.patch
+# fetch https://security.FreeBSD.org/patches/SA-23:10/pf.13.patch.asc
+# gpg --verify pf.13.patch.asc
+
+[FreeBSD 12.4]
+# fetch https://security.FreeBSD.org/patches/SA-23:10/pf.12.patch
+# fetch https://security.FreeBSD.org/patches/SA-23:10/pf.12.patch.asc
+# gpg --verify pf.12.patch.asc
+
+b) Apply the patch.  Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile your kernel as described in
+<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
+system.
+
+VI.  Correction details
+
+This issue is corrected by the corresponding Git commit hash or Subversion
+revision number in the following stable and release branches:
+
+Branch/path                             Hash                     Revision
+- -------------------------------------------------------------------------
+stable/13/                              3a0461f23a4f    stable/13-n255953
+releng/13.2/                            41b7760991ef  releng/13.2-n254631
+stable/12/                                                        r373157
+releng/12.4/                                                      r373186
+- -------------------------------------------------------------------------
+
+For FreeBSD 13 and later:
+
+Run the following command to see which files were modified by a
+particular commit:
+
+# git show --stat <commit hash>
+
+Or visit the following URL, replacing NNNNNN with the hash:
+
+<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
+
+To determine the commit count in a working tree (for comparison against
+nNNNNNN in the table above), run:
+
+# git rev-list --count --first-parent HEAD
+
+For FreeBSD 12 and earlier:
+
+Run the following command to see which files were modified by a particular
+revision, replacing NNNNNN with the revision number:
+
+# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
+
+Or visit the following URL, replacing NNNNNN with the revision number:
+
+<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
+
+VII. References
+
+<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4809>
+
+The latest revision of this advisory is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-23:10.pf.asc>
+-----BEGIN PGP SIGNATURE-----
+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+=bpCy
+-----END PGP SIGNATURE-----
diff --git a/website/static/security/advisories/FreeBSD-SA-23:11.wifi.asc b/website/static/security/advisories/FreeBSD-SA-23:11.wifi.asc
new file mode 100644
index 0000000000..8cb94c6316
--- /dev/null
+++ b/website/static/security/advisories/FreeBSD-SA-23:11.wifi.asc
@@ -0,0 +1,153 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-SA-23:11.wifi                                       Security Advisory
+                                                          The FreeBSD Project
+
+Topic:          Wi-Fi encryption bypass
+
+Category:       core
+Module:         net80211
+Announced:      2023-09-06
+Credits:        See the paper linked in the References section.
+Affects:        All supported versions of FreeBSD.
+Corrected:      2023-06-26 12:02:00 UTC (stable/13, 13.2-STABLE)
+                2023-09-06 17:13:25 UTC (releng/13.2, 13.2-RELEASE-p3)
+                2023-06-26 12:30:23 UTC (stable/12, 12.4-STABLE)
+                2023-09-06 17:38:34 UTC (releng/12.4, 12.4-RELEASE-p5)
+CVE Name:       CVE-2022-47522
+
+For general information regarding FreeBSD Security Advisories,
+including descriptions of the fields above, security branches, and the
+following sections, please visit <URL:https://security.FreeBSD.org/>.
+
+I.   Background
+
+FreeBSD's net80211 kernel subsystem provides infrastructure and drivers
+for IEEE 802.11 wireless (Wi-Fi) communications.  Wi-Fi communications rely
+on both unicast and multicast keys to secure transmissions.
+
+II.  Problem Description
+
+The net80211 subsystem would fallback to the multicast key for unicast
+traffic in the event the unicast key was removed.  This would result in
+buffered unicast traffic being exposed to any stations with access to the
+multicast key.
+
+III. Impact
+
+As described in the "Framing Frames: Bypassing Wi-Fi Encryption by
+Manipulating Transmit Queues" paper, an attacker can induce an access point
+to buffer frames for a client, deauthenticate the client (causing the unicast
+key to be removed from the access point), and subsequent flushing of the
+buffered frames now encrypted with the multicast key.  This would give the
+attacker access to the data.
+
+IV.  Workaround
+
+No workaround is available.  Systems not using Wi-Fi are not affected.
+
+V.   Solution
+
+Upgrade your vulnerable system to a supported FreeBSD stable or
+release / security branch (releng) dated after the correction date
+and reboot
+
+Perform one of the following:
+
+1) To update your vulnerable system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the amd64, i386, or
+(on FreeBSD 13 and later) arm64 platforms can be updated via the
+freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+# shutdown -r +10min "Rebooting for a security update"
+
+2) To update your vulnerable system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch https://security.FreeBSD.org/patches/SA-23:11/wifi.patch
+# fetch https://security.FreeBSD.org/patches/SA-23:11/wifi.patch.asc
+# gpg --verify wifi.patch.asc
+
+b) Apply the patch.  Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile your kernel as described in
+<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
+system.
+
+VI.  Correction details
+
+This issue is corrected by the corresponding Git commit hash or Subversion
+revision number in the following stable and release branches:
+
+Branch/path                             Hash                     Revision
+- -------------------------------------------------------------------------
+stable/13/                              6c9bcecfb296    stable/13-n255680
+releng/13.2/                            7f34ee7cc56b  releng/13.2-n254632
+stable/12/                                                        r373115
+releng/12.4/                                                      r373187
+- -------------------------------------------------------------------------
+
+For FreeBSD 13 and later:
+
+Run the following command to see which files were modified by a
+particular commit:
+
+# git show --stat <commit hash>
+
+Or visit the following URL, replacing NNNNNN with the hash:
+
+<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
+
+To determine the commit count in a working tree (for comparison against
+nNNNNNN in the table above), run:
+
+# git rev-list --count --first-parent HEAD
+
+For FreeBSD 12 and earlier:
+
+Run the following command to see which files were modified by a particular
+revision, replacing NNNNNN with the revision number:
+
+# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
+
+Or visit the following URL, replacing NNNNNN with the revision number:
+
+<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
+
+VII. References
+
+<URL:https://papers.mathyvanhoef.com/usenix2023-wifi.pdf>
+
+<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47522>
+
+The latest revision of this advisory is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-23:11.wifi.asc>
+-----BEGIN PGP SIGNATURE-----
+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+=lSpK
+-----END PGP SIGNATURE-----
diff --git a/website/static/security/patches/EN-23:09/freebsd-update.patch b/website/static/security/patches/EN-23:09/freebsd-update.patch
new file mode 100644
index 0000000000..93d95df184
--- /dev/null
+++ b/website/static/security/patches/EN-23:09/freebsd-update.patch
@@ -0,0 +1,54 @@
+--- usr.sbin/freebsd-update/freebsd-update.sh.orig
++++ usr.sbin/freebsd-update/freebsd-update.sh
+@@ -1677,11 +1677,12 @@
+ 	echo "done."
+ }
+ 
+-# For any paths matching ${MERGECHANGES}, compare $1 and $2 and find any
+-# files which differ; generate $3 containing these paths and the old hashes.
++# For any paths matching ${MERGECHANGES}, compare $2 against $1 and $3 and
++# find any files with values unique to $2; generate $4 containing these paths
++# and their corresponding hashes from $1.
+ fetch_filter_mergechanges () {
+ 	# Pull out the paths and hashes of the files matching ${MERGECHANGES}.
+-	for F in $1 $2; do
++	for F in $1 $2 $3; do
+ 		for X in ${MERGECHANGES}; do
+ 			grep -E "^${X}" ${F}
+ 		done |
+@@ -1689,9 +1690,10 @@
+ 		    sort > ${F}-values
+ 	done
+ 
+-	# Any line in $2-values which doesn't appear in $1-values and is a
+-	# file means that we should list the path in $3.
+-	comm -13 $1-values $2-values |
++	# Any line in $2-values which doesn't appear in $1-values or $3-values
++	# and is a file means that we should list the path in $3.
++	sort $1-values $3-values |
++	    comm -13 - $2-values |
+ 	    fgrep '|f|' |
+ 	    cut -f 1 -d '|' > $2-paths
+ 
+@@ -1703,10 +1705,10 @@
+ 	while read X; do
+ 		look "${X}|" $1-values |
+ 		    head -1
+-	done < $2-paths > $3
++	done < $2-paths > $4
+ 
+ 	# Clean up
+-	rm $1-values $2-values $2-paths
++	rm $1-values $2-values $3-values $2-paths
+ }
+ 
+ # For any paths matching ${UPDATEIFUNMODIFIED}, remove lines from $[123]
+@@ -2711,7 +2713,7 @@
+ 
+ 	# Based on ${MERGECHANGES}, generate a file tomerge-old with the
+ 	# paths and hashes of old versions of files to merge.
+-	fetch_filter_mergechanges INDEX-OLD INDEX-PRESENT tomerge-old
++	fetch_filter_mergechanges INDEX-OLD INDEX-PRESENT INDEX-NEW tomerge-old
+ 
+ 	# Based on ${UPDATEIFUNMODIFIED}, remove lines from INDEX-* which
+ 	# correspond to lines in INDEX-PRESENT with hashes not appearing
diff --git a/website/static/security/patches/EN-23:09/freebsd-update.patch.asc b/website/static/security/patches/EN-23:09/freebsd-update.patch.asc
new file mode 100644
index 0000000000..07b47b9f48
--- /dev/null
+++ b/website/static/security/patches/EN-23:09/freebsd-update.patch.asc
@@ -0,0 +1,16 @@
+-----BEGIN PGP SIGNATURE-----
+
+iQIzBAABCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmT4vyQACgkQbljekB8A
+Gu/mfw/+P21XhWB3J4i1xlC/yhpChzjAm6ok7e3nfE/HqdkaxD0GcI/F2sqB1tkS
+8YA/wTqTmP9YZGIiFhPcgLJj9+s4YLVq+iITgTDpdlDUcN6WA2KdKOYJRWhWKCfY
+6R6LkBb6qk/iDzWiplomoTjfe5u+lmgFuIfswflxEwVk11a+KgEnQw5A1tR3AqQM
+3jTOEtbZUpUegFK5RXKMaK925fCfOOvHOaQLr/RIeyRxe6LQ/ie1soJtHu3mdVTU
+UZinDH9epGthFWs8SWG3GC91sgjLNNrpNMsuYDZjJZpCKJN/m9tQgy06zdCC2UdQ
+jmfvXQok9OYIjNd3X3ZoIHfiKw5zMi5Q+SdyvYHeGKCzGgFt/2CbAm2BW3Baq70B
+qpD2mCwatFAmn7rUhhvFK4R3GrraKiUMHBCTeliVf0ta4ol4isbVwNpZTC+Q8rWb
+YbKQeg2/DyYaHfQrrLn8GFRt7HdqHX5ibdYXE7mbXAJejbGwC8LxdmQ1ulycF8HX
+p7cHzu1aVEE3ApF/uvcT45od4uHGnypEPYQFAM35S0KEdrC2ELh7x7a7LipHnqda
+3C9HdmobZQx0rcoVQRIxitPal2x/oNTCU0w1sF0Dl5ipj0zjtoKPPe0EMftfypZq
+b0mmVXgTtoXahN3wQNPJtRrYWEEOp+7xiRfyMBpXxn331bOgSco=
+=eI/L
+-----END PGP SIGNATURE-----
diff --git a/website/static/security/patches/EN-23:10/pci.patch b/website/static/security/patches/EN-23:10/pci.patch
new file mode 100644
index 0000000000..9134ccf09e
--- /dev/null
+++ b/website/static/security/patches/EN-23:10/pci.patch
@@ -0,0 +1,56 @@
+--- sys/dev/pci/pci_pci.c.orig
++++ sys/dev/pci/pci_pci.c
+@@ -1324,7 +1324,7 @@
+ pcib_alloc_pcie_irq(struct pcib_softc *sc)
+ {
+ 	device_t dev;
+-	int count, error, rid;
++	int count, error, mem_rid, rid;
+ 
+ 	rid = -1;
+ 	dev = sc->dev;
+@@ -1336,9 +1336,17 @@
+ 	 */
+ 	count = pci_msix_count(dev);
+ 	if (count == 1) {
+-		error = pci_alloc_msix(dev, &count);
+-		if (error == 0)
+-			rid = 1;
++		mem_rid = pci_msix_table_bar(dev);
++		sc->pcie_mem = bus_alloc_resource_any(dev, SYS_RES_MEMORY,
++		    &mem_rid, RF_ACTIVE);
++		if (sc->pcie_mem == NULL) {
++			device_printf(dev,
++			    "Failed to allocate BAR for MSI-X table\n");
++		} else {
++			error = pci_alloc_msix(dev, &count);
++			if (error == 0)
++				rid = 1;
++		}
+ 	}
+ 
+ 	if (rid < 0 && pci_msi_count(dev) > 0) {
+@@ -1386,7 +1394,12 @@
+ 	error = bus_free_resource(dev, SYS_RES_IRQ, sc->pcie_irq);
+ 	if (error)
+ 		return (error);
+-	return (pci_release_msi(dev));
++	error = pci_release_msi(dev);
++	if (error)
++		return (error);
++	if (sc->pcie_mem != NULL)
++		error = bus_free_resource(dev, SYS_RES_MEMORY, sc->pcie_mem);
++	return (error);
+ }
+ 
+ static void
+--- sys/dev/pci/pcib_private.h.orig
++++ sys/dev/pci/pcib_private.h
+@@ -134,6 +134,7 @@
+     uint16_t	pcie_link_sta;
+     uint16_t	pcie_slot_sta;
+     uint32_t	pcie_slot_cap;
++    struct resource *pcie_mem;
+     struct resource *pcie_irq;
+     void	*pcie_ihand;
+     struct task	pcie_hp_task;
diff --git a/website/static/security/patches/EN-23:10/pci.patch.asc b/website/static/security/patches/EN-23:10/pci.patch.asc
new file mode 100644
index 0000000000..95e2a11ba2
--- /dev/null
+++ b/website/static/security/patches/EN-23:10/pci.patch.asc
@@ -0,0 +1,16 @@
+-----BEGIN PGP SIGNATURE-----
+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+=9LPI
+-----END PGP SIGNATURE-----
diff --git a/website/static/security/patches/EN-23:11/caroot.patch b/website/static/security/patches/EN-23:11/caroot.patch
new file mode 100644
index 0000000000..bcac9d1cf1
--- /dev/null
+++ b/website/static/security/patches/EN-23:11/caroot.patch
@@ -0,0 +1,2119 @@
+--- /dev/null
++++ secure/caroot/trusted/BJCA_Global_Root_CA1.pem
+@@ -0,0 +1,135 @@
++##
++##  BJCA Global Root CA1
++##
++##  This is a single X.509 certificate for a public Certificate
++##  Authority (CA). It was automatically extracted from Mozilla's
++##  root CA list (the file `certdata.txt' in security/nss).
*** 2308 LINES SKIPPED ***