| @@ -1,14 +1,14 @@ | | | @@ -1,14 +1,14 @@ |
1 | # $NetBSD: CHANGES-5.0.1,v 1.1.2.12 2009/05/18 21:39:23 bouyer Exp $ | | 1 | # $NetBSD: CHANGES-5.0.1,v 1.1.2.13 2009/05/26 04:23:05 snj Exp $ |
2 | | | 2 | |
3 | A complete list of changes from the NetBSD 5.0 release to the NetBSD 5.0.1 | | 3 | A complete list of changes from the NetBSD 5.0 release to the NetBSD 5.0.1 |
4 | release: | | 4 | release: |
5 | | | 5 | |
6 | gnu/usr.bin/groff/tmac/mdoc.local patched by hand | | 6 | gnu/usr.bin/groff/tmac/mdoc.local patched by hand |
7 | sys/sys/param.h patched by hand | | 7 | sys/sys/param.h patched by hand |
8 | | | 8 | |
9 | Welcome to 5.0.0_PATCH. | | 9 | Welcome to 5.0.0_PATCH. |
10 | [snj] | | 10 | [snj] |
11 | | | 11 | |
12 | sys/kern/uipc_socket.c 1.189 | | 12 | sys/kern/uipc_socket.c 1.189 |
13 | | | 13 | |
14 | PR kern/41311: Mutex error: mutex_vector_enter: locking against myself | | 14 | PR kern/41311: Mutex error: mutex_vector_enter: locking against myself |
| @@ -118,13 +118,20 @@ sys/arch/sparc/include/psl.h 1.45 | | | @@ -118,13 +118,20 @@ sys/arch/sparc/include/psl.h 1.45 |
118 | [martin, ticket #764] | | 118 | [martin, ticket #764] |
119 | | | 119 | |
120 | share/man/man7/sysctl.7 1.22 via patch | | 120 | share/man/man7/sysctl.7 1.22 via patch |
121 | | | 121 | |
122 | Document PROC_PID_LIMIT_SBSIZE. From Greg A. Woods in PR lib/36463. | | 122 | Document PROC_PID_LIMIT_SBSIZE. From Greg A. Woods in PR lib/36463. |
123 | Wording is taken from getrlimit(2). | | 123 | Wording is taken from getrlimit(2). |
124 | [snj, ticket #765] | | 124 | [snj, ticket #765] |
125 | | | 125 | |
126 | sys/arch/vax/include/mtpr.h 1.21, 1.22 | | 126 | sys/arch/vax/include/mtpr.h 1.21, 1.22 |
127 | | | 127 | |
128 | Add "memory" clobber to mtpr for barrier. See also kern/38637. | | 128 | Add "memory" clobber to mtpr for barrier. See also kern/38637. |
129 | [mhitch, ticket #767] | | 129 | [mhitch, ticket #767] |
130 | | | 130 | |
| | | 131 | dist/ntp/ntpd/ntp_crypto.c 1.15 |
| | | 132 | |
| | | 133 | Fix CVE-2009-1252: Buffer overflow in ntpd crypto code. A remote |
| | | 134 | attacker can send a specially constructed request packet that |
| | | 135 | would overflow the sprintf()'ed buffer causing ntpd to crash. |
| | | 136 | [dholland, ticket #777] |
| | | 137 | |