Date: Thu, 26 Mar 2026 01:11:26 +0000 From: Philip Paeps <philip@FreeBSD.org> To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org Subject: git: 0730d5233286 - releng/15.0 - Add UPDATING entries and bump version Message-ID: <69c487be.1822f.64f0cc44@gitrepo.freebsd.org>
index | next in thread | raw e-mail
The branch releng/15.0 has been updated by philip: URL: https://cgit.FreeBSD.org/src/commit/?id=0730d5233286ff35e9fa83309faa1b2d52fe9a65 commit 0730d5233286ff35e9fa83309faa1b2d52fe9a65 Author: Philip Paeps <philip@FreeBSD.org> AuthorDate: 2026-03-25 05:59:59 +0000 Commit: Philip Paeps <philip@FreeBSD.org> CommitDate: 2026-03-25 16:06:30 +0000 Add UPDATING entries and bump version Approved by: so --- UPDATING | 14 ++++++++++++++ sys/conf/newvers.sh | 2 +- 2 files changed, 15 insertions(+), 1 deletion(-) diff --git a/UPDATING b/UPDATING index 6fdc5195e4d6..c70721ba8726 100644 --- a/UPDATING +++ b/UPDATING @@ -12,6 +12,20 @@ Items affecting the ports and packages system can be found in /usr/ports/UPDATING. Please read that file before updating system packages and/or ports. +20260325: + 15.0-RELEASE-p5 SA-26:06.tcp + SA-26:07.nvmf + SA-26:08.rpcsec_gss + SA-26:09.pf + + TCP: remotely exploitable DoS vector (mbuf leak). [SA-26:06.tcp] + + Remote denial of service via null pointer dereference. [SA-26:07.nvmf] + + Remote code execution via RPCSEC_GSS packet validation. [SA-26:08.rpcsec_gss] + + pf silently ignores certain rules. [SA-26:09.pf] + 20260224: 15.0-RELEASE-p4 SA-26:05.route diff --git a/sys/conf/newvers.sh b/sys/conf/newvers.sh index 3f0163ecefe2..6044b7921c52 100644 --- a/sys/conf/newvers.sh +++ b/sys/conf/newvers.sh @@ -51,7 +51,7 @@ TYPE="FreeBSD" REVISION="15.0" -BRANCH="RELEASE-p4" +BRANCH="RELEASE-p5" if [ -n "${BRANCH_OVERRIDE}" ]; then BRANCH=${BRANCH_OVERRIDE} fihome | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69c487be.1822f.64f0cc44>
