Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/netbsd-6-0]: src/doc tickets 1429-1432



details:   https://anonhg.NetBSD.org/src/rev/f5942a89551e
branches:  netbsd-6-0
changeset: 775172:f5942a89551e
user:      snj <snj%NetBSD.org@localhost>
date:      Sun Feb 05 06:11:37 2017 +0000

description:
tickets 1429-1432

diffstat:

 doc/CHANGES-6.0.7 |  26 +++++++++++++++++++++++++-
 1 files changed, 25 insertions(+), 1 deletions(-)

diffs (37 lines):

diff -r 91f55185af7e -r f5942a89551e doc/CHANGES-6.0.7
--- a/doc/CHANGES-6.0.7 Sun Feb 05 06:06:41 2017 +0000
+++ b/doc/CHANGES-6.0.7 Sun Feb 05 06:11:37 2017 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-6.0.7,v 1.1.2.80 2016/11/13 06:42:48 snj Exp $
+# $NetBSD: CHANGES-6.0.7,v 1.1.2.81 2017/02/05 06:11:37 snj Exp $
 
 A complete list of changes from the NetBSD 6.0.6 release to the NetBSD 6.0.7
 release:
@@ -9353,3 +9353,27 @@
        Fix build with gcc5.
        [pgoyette, ticket #1417]
 
+sys/net/if_arcsubr.c                           1.76 via patch
+sys/net/if_ecosubr.c                           1.50 via patch
+sys/net/if_ethersubr.c                         1.236 via patch
+sys/net/if_fddisubr.c                          1.104 via patch
+sys/net/if_tokensubr.c                         1.80 via patch
+
+       Don't leak an mbuf in the ARP reply.
+       [maxv, ticket #1429]
+
+crypto/external/bsd/openssl/dist/crypto/evp/e_rc4_hmac_md5.c patch
+
+       Fix CVE-2017-3731.
+       [spz, ticket #1430]
+
+sys/arch/amd64/amd64/copy.S                    patch
+
+       suword: Don't allow 4 bytes to overflow beyond the userland space.
+       [maxv, ticket #1431]
+
+sys/netinet/if_arp.c                           1.238, 1.239 via patch
+
+       Add checks on the ARP header
+       [maxv, ticket #1432]
+



Home | Main Index | Thread Index | Old Index