Module Name:    src
Committed By:   snj
Date:           Sun Feb  5 07:10:10 UTC 2017

Modified Files:
        src/doc [netbsd-6]: CHANGES-6.2

Log Message:
1429-1432


To generate a diff of this commit:
cvs rdiff -u -r1.1.2.269 -r1.1.2.270 src/doc/CHANGES-6.2

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/doc/CHANGES-6.2
diff -u src/doc/CHANGES-6.2:1.1.2.269 src/doc/CHANGES-6.2:1.1.2.270
--- src/doc/CHANGES-6.2:1.1.2.269	Sun Jan 15 23:53:13 2017
+++ src/doc/CHANGES-6.2	Sun Feb  5 07:10:10 2017
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-6.2,v 1.1.2.269 2017/01/15 23:53:13 snj Exp $
+# $NetBSD: CHANGES-6.2,v 1.1.2.270 2017/02/05 07:10:10 snj Exp $
 
 A complete list of changes from the 6.1 release until the 6.2 release:
 
@@ -15432,3 +15432,27 @@ sys/dev/scsipi/scsi_disk.h			1.32
 	scsi_disk_pages while there.  PR bin/29165.
 	[flxd, ticket #1418]
 
+sys/net/if_arcsubr.c				1.76 via patch
+sys/net/if_ecosubr.c				1.50 via patch
+sys/net/if_ethersubr.c				1.236 via patch
+sys/net/if_fddisubr.c				1.104 via patch
+sys/net/if_tokensubr.c				1.80 via patch
+
+	Don't leak an mbuf in the ARP reply.
+	[maxv, ticket #1429]
+
+crypto/external/bsd/openssl/dist/crypto/evp/e_rc4_hmac_md5.c patch
+
+	Fix CVE-2017-3731.
+	[spz, ticket #1430]
+
+sys/arch/amd64/amd64/copy.S			patch
+
+	suword: Don't allow 4 bytes to overflow beyond the userland space.
+	[maxv, ticket #1431]
+
+sys/netinet/if_arp.c				1.238, 1.239 via patch
+
+	Add checks on the ARP header
+	[maxv, ticket #1432]
+

Reply via email to