~ chicken-core (chicken-5) 97d76fe8a9e0bfec757cbb2b84367f420643407d
commit 97d76fe8a9e0bfec757cbb2b84367f420643407d
Author: Peter Bex <peter@more-magic.net>
AuthorDate: Mon Sep 25 19:38:14 2017 +0200
Commit: Peter Bex <peter@more-magic.net>
CommitDate: Mon Sep 25 19:38:28 2017 +0200
Add DragonflyBSD fix and missing CVE ID for randomization factor to NEWS
diff --git a/NEWS b/NEWS
index 31eda452..3727dba0 100644
--- a/NEWS
+++ b/NEWS
@@ -110,9 +110,9 @@
buffer overrun and/or segfault (thanks to Lemonboy).
- CVE-2017-9334: `length' no longer crashes on improper lists (fixes
#1375, thanks to "megane").
- - The randomization factor of the symbol table was set before
- the random seed was set, causing it to have a fixed value on many
- platforms.
+ - CVE-2017-11343: The randomization factor of the symbol table was
+ set before the random seed was set, causing it to have a fixed value
+ on many platforms.
- Core Libraries
- Unit "posix": If file-lock, file-lock/blocking or file-unlock are
@@ -134,6 +134,8 @@
- Build system
- Fixed broken compilation on NetBSD, due to missing _NETBSD_SOURCE.
+ - Fixed compilation on DragonflyBSD due to no feature macro support
+ in its standard C library (thanks to Markus Pfeiffer).
- Compiler
- The scrutinizer no longer uses 'fixnum as the type for fixnums
Trap