Thu Mar 19 18:13:25 2015 UTC ()
Fix paths in previous.


(riz)
diff -r1.1.2.21 -r1.1.2.22 src/doc/CHANGES-5.1.6

cvs diff -r1.1.2.21 -r1.1.2.22 src/doc/Attic/CHANGES-5.1.6 (expand / switch to unified diff)

--- src/doc/Attic/CHANGES-5.1.6 2015/03/19 16:40:32 1.1.2.21
+++ src/doc/Attic/CHANGES-5.1.6 2015/03/19 18:13:25 1.1.2.22
@@ -1,14 +1,14 @@ @@ -1,14 +1,14 @@
1# $NetBSD: CHANGES-5.1.6,v 1.1.2.21 2015/03/19 16:40:32 riz Exp $ 1# $NetBSD: CHANGES-5.1.6,v 1.1.2.22 2015/03/19 18:13:25 riz Exp $
2 2
3A complete list of changes from the NetBSD 5.1.5 release to the NetBSD 5.1.6 3A complete list of changes from the NetBSD 5.1.5 release to the NetBSD 5.1.6
4release: 4release:
5 5
6doc/LAST_MINUTE patched by hand 6doc/LAST_MINUTE patched by hand
7doc/README.files patched by hand 7doc/README.files patched by hand
8gnu/usr.bin/groff/tmac/mdoc.local patched by hand 8gnu/usr.bin/groff/tmac/mdoc.local patched by hand
9sys/sys/param.h patched by hand 9sys/sys/param.h patched by hand
10 10
11 Welcome to 5.1.5_PATCH. 11 Welcome to 5.1.5_PATCH.
12 [snj] 12 [snj]
13 13
14sys/dev/raidframe/raidframevar.h 1.17 14sys/dev/raidframe/raidframevar.h 1.17
@@ -2555,32 +2555,32 @@ distrib/utils/x_gzip/Makefile patch @@ -2555,32 +2555,32 @@ distrib/utils/x_gzip/Makefile patch
2555 2555
2556 Sync gzip core with HEAD. 2556 Sync gzip core with HEAD.
2557 [mrg, ticket #1951] 2557 [mrg, ticket #1951]
2558 2558
2559xsrc/external/mit/libXfont/dist/src/bitmap/bdfread.c patch 2559xsrc/external/mit/libXfont/dist/src/bitmap/bdfread.c patch
2560xsrc/xfree/xc/lib/font/bitmap/bdfread.c patch 2560xsrc/xfree/xc/lib/font/bitmap/bdfread.c patch
2561 2561
2562 Fix CVE-2015-1802 (bdfReadProperties: property count needs 2562 Fix CVE-2015-1802 (bdfReadProperties: property count needs
2563 range check), CVE-2015-1803 (bdfReadCharacters: bailout if a 2563 range check), CVE-2015-1803 (bdfReadCharacters: bailout if a
2564 char's bitmap cannot be read), and CVE-2015-1804 2564 char's bitmap cannot be read), and CVE-2015-1804
2565 (bdfReadCharacters: ensure metrics fit into xCharInfo struct) 2565 (bdfReadCharacters: ensure metrics fit into xCharInfo struct)
2566 [mrg, ticket #1953] 2566 [mrg, ticket #1953]
2567 2567
2568crypto/external/bsd/openssl/dist/crypto/asn1/a_type.c 1.2 2568crypto/dist/openssl/dist/crypto/asn1/a_type.c 1.2
2569crypto/external/bsd/openssl/dist/crypto/asn1/tasn_dec.c 1.2 2569crypto/dist/openssl/dist/crypto/asn1/tasn_dec.c 1.2
2570crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_doit.c 1.2 2570crypto/dist/openssl/dist/crypto/pkcs7/pk7_doit.c 1.2
2571crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_lib.c 1.2 2571crypto/dist/openssl/dist/crypto/pkcs7/pk7_lib.c 1.2
2572crypto/external/bsd/openssl/dist/doc/crypto/d2i_X509.pod 1.2 2572crypto/dist/openssl/dist/doc/crypto/d2i_X509.pod 1.2
2573crypto/external/bsd/openssl/dist/ssl/s2_lib.c 1.3 2573crypto/dist/openssl/dist/ssl/s2_lib.c 1.3
2574crypto/external/bsd/openssl/dist/ssl/s2_srvr.c 1.2 2574crypto/dist/openssl/dist/ssl/s2_srvr.c 1.2
2575 2575
2576 Address OpenSSL Security Advisory [19 Mar 2015]: 2576 Address OpenSSL Security Advisory [19 Mar 2015]:
2577 RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204) 2577 RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
2578 Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286) 2578 Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
2579 ASN.1 structure reuse memory corruption (CVE-2015-0287) 2579 ASN.1 structure reuse memory corruption (CVE-2015-0287)
2580 PKCS7 NULL pointer dereferences (CVE-2015-0289) 2580 PKCS7 NULL pointer dereferences (CVE-2015-0289)
2581 Base64 decode (CVE-2015-0292) 2581 Base64 decode (CVE-2015-0292)
2582 DoS via reachable assert in SSLv2 servers (CVE-2015-0293) 2582 DoS via reachable assert in SSLv2 servers (CVE-2015-0293)
2583 Use After Free following d2i_ECPrivatekey error (CVE-2015-0209) 2583 Use After Free following d2i_ECPrivatekey error (CVE-2015-0209)
2584 X509_to_X509_REQ NULL pointer deref (CVE-2015-0288) 2584 X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)
2585 [spz, ticket #1954] 2585 [spz, ticket #1954]
2586 2586