Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Mar 2026 01:15:01 +0000
From:      Philip Paeps <philip@FreeBSD.org>
To:        src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org
Subject:   git: a5812c77639b - releng/14.4 - Add UPDATING entries and bump version
Message-ID:  <69c48895.18d9d.53989773@gitrepo.freebsd.org>

index | next in thread | raw e-mail

The branch releng/14.4 has been updated by philip:

URL: https://cgit.FreeBSD.org/src/commit/?id=a5812c77639bde4b460db04e8050b09281dd7835

commit a5812c77639bde4b460db04e8050b09281dd7835
Author:     Philip Paeps <philip@FreeBSD.org>
AuthorDate: 2026-03-25 06:05:40 +0000
Commit:     Philip Paeps <philip@FreeBSD.org>
CommitDate: 2026-03-25 16:11:11 +0000

    Add UPDATING entries and bump version
    
    Approved by:    so
---
 UPDATING            | 11 +++++++++++
 sys/conf/newvers.sh |  2 +-
 2 files changed, 12 insertions(+), 1 deletion(-)

diff --git a/UPDATING b/UPDATING
index 42f8d9788aad..37cb107c7947 100644
--- a/UPDATING
+++ b/UPDATING
@@ -12,6 +12,17 @@ Items affecting the ports and packages system can be found in
 /usr/ports/UPDATING.  Please read that file before updating system packages
 and/or ports.
 
+20260325:
+	14.4-RELEASE-p1	SA-26:06.tcp
+			SA-26:08.rpcsec_gss
+			SA-26:09.pf
+
+	TCP: remotely exploitable DoS vector (mbuf leak). [SA-26:06.tcp]
+
+	Remote code execution via RPCSEC_GSS packet validation. [SA-26:08.rpcsec_gss]
+
+	pf silently ignores certain rules. [SA-26:09.pf]
+
 20260310:
 	14.4-RELEASE.
 
diff --git a/sys/conf/newvers.sh b/sys/conf/newvers.sh
index ba11232e7c54..329e4ac3875f 100644
--- a/sys/conf/newvers.sh
+++ b/sys/conf/newvers.sh
@@ -53,7 +53,7 @@
 
 TYPE="FreeBSD"
 REVISION="14.4"
-BRANCH="RELEASE"
+BRANCH="RELEASE-p1"
 if [ -n "${BRANCH_OVERRIDE}" ]; then
 	BRANCH=${BRANCH_OVERRIDE}
 fi


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69c48895.18d9d.53989773>