Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/netbsd-8]: src/doc tickets 1557-1559
details: https://anonhg.NetBSD.org/src/rev/bacf3c1d2377
branches: netbsd-8
changeset: 934690:bacf3c1d2377
user: bouyer <bouyer%NetBSD.org@localhost>
date: Tue Jun 16 10:29:16 2020 +0000
description:
tickets 1557-1559
diffstat:
doc/CHANGES-8.3 | 20 +++++++++++++++++++-
1 files changed, 19 insertions(+), 1 deletions(-)
diffs (31 lines):
diff -r 52245048f610 -r bacf3c1d2377 doc/CHANGES-8.3
--- a/doc/CHANGES-8.3 Tue Jun 16 10:28:29 2020 +0000
+++ b/doc/CHANGES-8.3 Tue Jun 16 10:29:16 2020 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-8.3,v 1.1.2.13 2020/06/07 17:09:33 martin Exp $
+# $NetBSD: CHANGES-8.3,v 1.1.2.14 2020/06/16 10:29:16 bouyer Exp $
A complete list of changes from the NetBSD 8.2 release to the NetBSD 8.3
release:
@@ -184,3 +184,21 @@
gracefully exit when an error occurs in _lwp_create(2).
[thorpej, ticket #1556]
+sys/arch/mac68k/dev/ams.c 1.23
+
+ Fix inverted Y-axis value passed to wsmouse_input(9).
+ [tsutsui, ticket #1557]
+
+sys/dev/usb/if_otus.c 1.45 via patch
+
+ Stricter bounds check for some packet length we get from the usb chip,
+ to make sure we do not corrupt kernel memory.
+ Pointed out by Ilja Van Sprundel.
+ [martin, ticket #1558]
+
+sys/dev/usb/if_run.c 1.41
+
+ Better bounds checking for oversized packets, to avoid kernel memory
+ corruption. Pointed out by Ilja Van Sprundel.
+ [martin, ticket #1559]
+
Home |
Main Index |
Thread Index |
Old Index