Tue May 26 04:23:05 2009 UTC ()
Ticket 777.


(snj)
diff -r1.1.2.12 -r1.1.2.13 src/doc/CHANGES-5.0.1

cvs diff -r1.1.2.12 -r1.1.2.13 src/doc/Attic/CHANGES-5.0.1 (expand / switch to unified diff)

--- src/doc/Attic/CHANGES-5.0.1 2009/05/18 21:39:23 1.1.2.12
+++ src/doc/Attic/CHANGES-5.0.1 2009/05/26 04:23:05 1.1.2.13
@@ -1,14 +1,14 @@ @@ -1,14 +1,14 @@
1# $NetBSD: CHANGES-5.0.1,v 1.1.2.12 2009/05/18 21:39:23 bouyer Exp $ 1# $NetBSD: CHANGES-5.0.1,v 1.1.2.13 2009/05/26 04:23:05 snj Exp $
2 2
3A complete list of changes from the NetBSD 5.0 release to the NetBSD 5.0.1 3A complete list of changes from the NetBSD 5.0 release to the NetBSD 5.0.1
4release: 4release:
5 5
6gnu/usr.bin/groff/tmac/mdoc.local patched by hand 6gnu/usr.bin/groff/tmac/mdoc.local patched by hand
7sys/sys/param.h patched by hand 7sys/sys/param.h patched by hand
8 8
9 Welcome to 5.0.0_PATCH. 9 Welcome to 5.0.0_PATCH.
10 [snj] 10 [snj]
11 11
12sys/kern/uipc_socket.c 1.189 12sys/kern/uipc_socket.c 1.189
13 13
14 PR kern/41311: Mutex error: mutex_vector_enter: locking against myself 14 PR kern/41311: Mutex error: mutex_vector_enter: locking against myself
@@ -118,13 +118,20 @@ sys/arch/sparc/include/psl.h 1.45 @@ -118,13 +118,20 @@ sys/arch/sparc/include/psl.h 1.45
118 [martin, ticket #764] 118 [martin, ticket #764]
119 119
120share/man/man7/sysctl.7 1.22 via patch 120share/man/man7/sysctl.7 1.22 via patch
121 121
122 Document PROC_PID_LIMIT_SBSIZE. From Greg A. Woods in PR lib/36463. 122 Document PROC_PID_LIMIT_SBSIZE. From Greg A. Woods in PR lib/36463.
123 Wording is taken from getrlimit(2). 123 Wording is taken from getrlimit(2).
124 [snj, ticket #765] 124 [snj, ticket #765]
125 125
126sys/arch/vax/include/mtpr.h 1.21, 1.22 126sys/arch/vax/include/mtpr.h 1.21, 1.22
127 127
128 Add "memory" clobber to mtpr for barrier. See also kern/38637. 128 Add "memory" clobber to mtpr for barrier. See also kern/38637.
129 [mhitch, ticket #767] 129 [mhitch, ticket #767]
130 130
 131dist/ntp/ntpd/ntp_crypto.c 1.15
 132
 133 Fix CVE-2009-1252: Buffer overflow in ntpd crypto code. A remote
 134 attacker can send a specially constructed request packet that
 135 would overflow the sprintf()'ed buffer causing ntpd to crash.
 136 [dholland, ticket #777]
 137