Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/netbsd-8]: src/doc tickets 1557-1559



details:   https://anonhg.NetBSD.org/src/rev/bacf3c1d2377
branches:  netbsd-8
changeset: 934690:bacf3c1d2377
user:      bouyer <bouyer%NetBSD.org@localhost>
date:      Tue Jun 16 10:29:16 2020 +0000

description:
tickets 1557-1559

diffstat:

 doc/CHANGES-8.3 |  20 +++++++++++++++++++-
 1 files changed, 19 insertions(+), 1 deletions(-)

diffs (31 lines):

diff -r 52245048f610 -r bacf3c1d2377 doc/CHANGES-8.3
--- a/doc/CHANGES-8.3   Tue Jun 16 10:28:29 2020 +0000
+++ b/doc/CHANGES-8.3   Tue Jun 16 10:29:16 2020 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-8.3,v 1.1.2.13 2020/06/07 17:09:33 martin Exp $
+# $NetBSD: CHANGES-8.3,v 1.1.2.14 2020/06/16 10:29:16 bouyer Exp $
 
 A complete list of changes from the NetBSD 8.2 release to the NetBSD 8.3
 release:
@@ -184,3 +184,21 @@
        gracefully exit when an error occurs in _lwp_create(2).
        [thorpej, ticket #1556]
 
+sys/arch/mac68k/dev/ams.c                      1.23
+
+       Fix inverted Y-axis value passed to wsmouse_input(9).
+       [tsutsui, ticket #1557]
+
+sys/dev/usb/if_otus.c                          1.45 via patch
+
+       Stricter bounds check for some packet length we get from the usb chip,
+       to make sure we do not corrupt kernel memory.
+       Pointed out by Ilja Van Sprundel.
+       [martin, ticket #1558]
+
+sys/dev/usb/if_run.c                           1.41
+
+       Better bounds checking for oversized packets, to avoid kernel memory
+       corruption. Pointed out by Ilja Van Sprundel.
+       [martin, ticket #1559]
+



Home | Main Index | Thread Index | Old Index