Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 6 Aug 2019 17:14:10 +0000 (UTC)
From:      Gordon Tetlow <gordon@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-releng@freebsd.org
Subject:   svn commit: r350649 - in releng: 11.2 11.2/sys/conf 11.3 11.3/sys/conf 12.0 12.0/sys/conf
Message-ID:  <201908061714.x76HEAen044043@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: gordon
Date: Tue Aug  6 17:14:09 2019
New Revision: 350649
URL: https://svnweb.freebsd.org/changeset/base/350649

Log:
  Bump version information and add UPDATING entries.
  
  Approved by:	so

Modified:
  releng/11.2/UPDATING
  releng/11.2/sys/conf/newvers.sh
  releng/11.3/UPDATING
  releng/11.3/sys/conf/newvers.sh
  releng/12.0/UPDATING
  releng/12.0/sys/conf/newvers.sh

Modified: releng/11.2/UPDATING
==============================================================================
--- releng/11.2/UPDATING	Tue Aug  6 17:13:41 2019	(r350648)
+++ releng/11.2/UPDATING	Tue Aug  6 17:14:09 2019	(r350649)
@@ -16,6 +16,24 @@ from older versions of FreeBSD, try WITHOUT_CLANG and 
 the tip of head, and then rebuild without this option. The bootstrap process
 from older version of current across the gcc/clang cutover is a bit fragile.
 
+20190806	p13	FreeBSD-EN-19:15.libunwind
+			FreeBSD-SA-19:18.bzip2
+			FreeBSD-SA-19:19.mldv2
+			FreeBSD-SA-19:20.bsnmp
+			FreeBSD-SA-19:21.bhyve
+
+	Fix incorrect exception handling. [EN-19:15.libunwind]
+
+	Fix multiple vulnerabilities in bzip2. [SA-19:18.bzip2]
+
+	Fix ICMPv6 / MLDv2 out-of-bounds memory access. [SA-19:19.mldv2]
+
+	Fix insufficient message length validation in bsnmp library.
+						[SA-19:20.bsnmp]
+
+	Fix insufficient validation of guest-supplied data (e1000 device).
+						[SA-19:21.bhyve]
+
 20190724	p12	FreeBSD-EN-19:13.mds
 			FreeBSD-SA-19:12.telnet
 			FreeBSD-SA-19:13.pts

Modified: releng/11.2/sys/conf/newvers.sh
==============================================================================
--- releng/11.2/sys/conf/newvers.sh	Tue Aug  6 17:13:41 2019	(r350648)
+++ releng/11.2/sys/conf/newvers.sh	Tue Aug  6 17:14:09 2019	(r350649)
@@ -44,7 +44,7 @@
 
 TYPE="FreeBSD"
 REVISION="11.2"
-BRANCH="RELEASE-p12"
+BRANCH="RELEASE-p13"
 if [ -n "${BRANCH_OVERRIDE}" ]; then
 	BRANCH=${BRANCH_OVERRIDE}
 fi

Modified: releng/11.3/UPDATING
==============================================================================
--- releng/11.3/UPDATING	Tue Aug  6 17:13:41 2019	(r350648)
+++ releng/11.3/UPDATING	Tue Aug  6 17:14:09 2019	(r350649)
@@ -16,6 +16,21 @@ from older versions of FreeBSD, try WITHOUT_CLANG and 
 the tip of head, and then rebuild without this option. The bootstrap process
 from older version of current across the gcc/clang cutover is a bit fragile.
 
+20190806	p2	FreeBSD-SA-19:18.bzip2
+			FreeBSD-SA-19:19.mldv2
+			FreeBSD-SA-19:20.bsnmp
+			FreeBSD-SA-19:21.bhyve
+
+	Fix multiple vulnerabilities in bzip2. [SA-19:18.bzip2]
+
+	Fix ICMPv6 / MLDv2 out-of-bounds memory access. [SA-19:19.mldv2]
+
+	Fix insufficient message length validation in bsnmp library.
+						[SA-19:20.bsnmp]
+
+	Fix insufficient validation of guest-supplied data (e1000 device).
+						[SA-19:21.bhyve]
+
 20190724	p1	FreeBSD-EN-19:13.mds
 			FreeBSD-SA-19:12.telnet
 			FreeBSD-SA-19:13.pts

Modified: releng/11.3/sys/conf/newvers.sh
==============================================================================
--- releng/11.3/sys/conf/newvers.sh	Tue Aug  6 17:13:41 2019	(r350648)
+++ releng/11.3/sys/conf/newvers.sh	Tue Aug  6 17:14:09 2019	(r350649)
@@ -44,7 +44,7 @@
 
 TYPE="FreeBSD"
 REVISION="11.3"
-BRANCH="RELEASE-p1"
+BRANCH="RELEASE-p2"
 if [ -n "${BRANCH_OVERRIDE}" ]; then
 	BRANCH=${BRANCH_OVERRIDE}
 fi

Modified: releng/12.0/UPDATING
==============================================================================
--- releng/12.0/UPDATING	Tue Aug  6 17:13:41 2019	(r350648)
+++ releng/12.0/UPDATING	Tue Aug  6 17:14:09 2019	(r350649)
@@ -16,6 +16,27 @@ from older versions of FreeBSD, try WITHOUT_CLANG and 
 the tip of head, and then rebuild without this option. The bootstrap process
 from older version of current across the gcc/clang cutover is a bit fragile.
 
+20190806	p9	FreeBSD-EN-19:14.epoch
+			FreeBSD-EN-19:15.libunwind
+			FreeBSD-SA-19:18.bzip2
+			FreeBSD-SA-19:19.mldv2
+			FreeBSD-SA-19:20.bsnmp
+			FreeBSD-SA-19:21.bhyve
+
+	Fix incorrect locking in epoch(9). [EN-19:14.epoch]
+
+	Fix incorrect exception handling. [EN-19:15.libunwind]
+
+	Fix multiple vulnerabilities in bzip2. [SA-19:18.bzip2]
+
+	Fix ICMPv6 / MLDv2 out-of-bounds memory access. [SA-19:19.mldv2]
+
+	Fix insufficient message length validation in bsnmp library.
+						[SA-19:20.bsnmp]
+
+	Fix insufficient validation of guest-supplied data (e1000 device).
+						[SA-19:21.bhyve]
+
 20190724	p8	FreeBSD-EN-19:13.mds
 			FreeBSD-SA-19:12.telnet
 			FreeBSD-SA-19:13.pts

Modified: releng/12.0/sys/conf/newvers.sh
==============================================================================
--- releng/12.0/sys/conf/newvers.sh	Tue Aug  6 17:13:41 2019	(r350648)
+++ releng/12.0/sys/conf/newvers.sh	Tue Aug  6 17:14:09 2019	(r350649)
@@ -46,7 +46,7 @@
 
 TYPE="FreeBSD"
 REVISION="12.0"
-BRANCH="RELEASE-p8"
+BRANCH="RELEASE-p9"
 if [ -n "${BRANCH_OVERRIDE}" ]; then
 	BRANCH=${BRANCH_OVERRIDE}
 fi



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201908061714.x76HEAen044043>