Date: Thu, 26 Mar 2026 01:16:07 +0000 From: Philip Paeps <philip@FreeBSD.org> To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org Subject: git: 2321f541c307 - releng/14.3 - Add UPDATING entries and bump version Message-ID: <69c488d7.18e35.6d3aba1f@gitrepo.freebsd.org>
index | next in thread | raw e-mail
The branch releng/14.3 has been updated by philip: URL: https://cgit.FreeBSD.org/src/commit/?id=2321f541c307590bb326f6785047275faf4c981b commit 2321f541c307590bb326f6785047275faf4c981b Author: Philip Paeps <philip@FreeBSD.org> AuthorDate: 2026-03-25 06:09:04 +0000 Commit: Philip Paeps <philip@FreeBSD.org> CommitDate: 2026-03-25 16:13:44 +0000 Add UPDATING entries and bump version Approved by: so --- UPDATING | 11 +++++++++++ sys/conf/newvers.sh | 2 +- 2 files changed, 12 insertions(+), 1 deletion(-) diff --git a/UPDATING b/UPDATING index 328fd425b883..20c41179af63 100644 --- a/UPDATING +++ b/UPDATING @@ -12,6 +12,17 @@ Items affecting the ports and packages system can be found in /usr/ports/UPDATING. Please read that file before updating system packages and/or ports. +20260325: + 14.3-RELEASE-p10 SA-26:06.tcp + SA-26:08.rpcsec_gss + SA-26:09.pf + + TCP: remotely exploitable DoS vector (mbuf leak). [SA-26:06.tcp] + + Remote code execution via RPCSEC_GSS packet validation. [SA-26:08.rpcsec_gss] + + pf silently ignores certain rules. [SA-26:09.pf] + 20250224: 14.3-RELEASE-p9 SA-26:04.jail SA-26:05.route diff --git a/sys/conf/newvers.sh b/sys/conf/newvers.sh index 6f6d7ac69d2c..7c77782c1c00 100644 --- a/sys/conf/newvers.sh +++ b/sys/conf/newvers.sh @@ -53,7 +53,7 @@ TYPE="FreeBSD" REVISION="14.3" -BRANCH="RELEASE-p9" +BRANCH="RELEASE-p10" if [ -n "${BRANCH_OVERRIDE}" ]; then BRANCH=${BRANCH_OVERRIDE} fihome | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69c488d7.18e35.6d3aba1f>
