Module Name: src Committed By: snj Date: Sun Feb 5 07:10:10 UTC 2017
Modified Files: src/doc [netbsd-6]: CHANGES-6.2 Log Message: 1429-1432 To generate a diff of this commit: cvs rdiff -u -r1.1.2.269 -r1.1.2.270 src/doc/CHANGES-6.2 Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/doc/CHANGES-6.2 diff -u src/doc/CHANGES-6.2:1.1.2.269 src/doc/CHANGES-6.2:1.1.2.270 --- src/doc/CHANGES-6.2:1.1.2.269 Sun Jan 15 23:53:13 2017 +++ src/doc/CHANGES-6.2 Sun Feb 5 07:10:10 2017 @@ -1,4 +1,4 @@ -# $NetBSD: CHANGES-6.2,v 1.1.2.269 2017/01/15 23:53:13 snj Exp $ +# $NetBSD: CHANGES-6.2,v 1.1.2.270 2017/02/05 07:10:10 snj Exp $ A complete list of changes from the 6.1 release until the 6.2 release: @@ -15432,3 +15432,27 @@ sys/dev/scsipi/scsi_disk.h 1.32 scsi_disk_pages while there. PR bin/29165. [flxd, ticket #1418] +sys/net/if_arcsubr.c 1.76 via patch +sys/net/if_ecosubr.c 1.50 via patch +sys/net/if_ethersubr.c 1.236 via patch +sys/net/if_fddisubr.c 1.104 via patch +sys/net/if_tokensubr.c 1.80 via patch + + Don't leak an mbuf in the ARP reply. + [maxv, ticket #1429] + +crypto/external/bsd/openssl/dist/crypto/evp/e_rc4_hmac_md5.c patch + + Fix CVE-2017-3731. + [spz, ticket #1430] + +sys/arch/amd64/amd64/copy.S patch + + suword: Don't allow 4 bytes to overflow beyond the userland space. + [maxv, ticket #1431] + +sys/netinet/if_arp.c 1.238, 1.239 via patch + + Add checks on the ARP header + [maxv, ticket #1432] +