Date: Tue, 5 Dec 2023 18:37:52 GMT From: Mark Johnston <markj@FreeBSD.org> To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org Subject: git: b5ad6b488d9e - releng/12.4 - Add UPDATING entries and bump version Message-ID: <202312051837.3B5IbqZc026789@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch releng/12.4 has been updated by markj: URL: https://cgit.FreeBSD.org/src/commit/?id=b5ad6b488d9e62d820fe90fdce4aee4f4d3d7162 commit b5ad6b488d9e62d820fe90fdce4aee4f4d3d7162 Author: Mark Johnston <markj@FreeBSD.org> AuthorDate: 2023-12-05 18:37:34 +0000 Commit: Mark Johnston <markj@FreeBSD.org> CommitDate: 2023-12-05 18:37:34 +0000 Add UPDATING entries and bump version Approved by: so --- UPDATING | 5 +++++ sys/conf/newvers.sh | 2 +- 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/UPDATING b/UPDATING index b951bf259ed6..bc54cc1cab16 100644 --- a/UPDATING +++ b/UPDATING @@ -17,6 +17,11 @@ from older versions of FreeBSD, try WITHOUT_CLANG and WITH_GCC to bootstrap to the tip of head, and then rebuild without this option. The bootstrap process from older version of current across the gcc/clang cutover is a bit fragile. +20231205: + 12.4-RELEASE-p9 FreeBSD-SA-23:17.pf + + TCP spoofing vulnerability in pf(4) [SA-23:17.pf] + 20231130: 12.4-RELEASE-p8 EN-23:16.openzfs diff --git a/sys/conf/newvers.sh b/sys/conf/newvers.sh index a264cb661e72..2abe405f83b7 100644 --- a/sys/conf/newvers.sh +++ b/sys/conf/newvers.sh @@ -49,7 +49,7 @@ TYPE="FreeBSD" REVISION="12.4" -BRANCH="RELEASE-p8" +BRANCH="RELEASE-p9" if [ -n "${BRANCH_OVERRIDE}" ]; then BRANCH=${BRANCH_OVERRIDE} fi
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202312051837.3B5IbqZc026789>