~ chicken-core (chicken-5) 97d76fe8a9e0bfec757cbb2b84367f420643407d


commit 97d76fe8a9e0bfec757cbb2b84367f420643407d
Author:     Peter Bex <peter@more-magic.net>
AuthorDate: Mon Sep 25 19:38:14 2017 +0200
Commit:     Peter Bex <peter@more-magic.net>
CommitDate: Mon Sep 25 19:38:28 2017 +0200

    Add DragonflyBSD fix and missing CVE ID for randomization factor to NEWS

diff --git a/NEWS b/NEWS
index 31eda452..3727dba0 100644
--- a/NEWS
+++ b/NEWS
@@ -110,9 +110,9 @@
     buffer overrun and/or segfault (thanks to Lemonboy).
   - CVE-2017-9334: `length' no longer crashes on improper lists (fixes
     #1375, thanks to "megane").
-  - The randomization factor of the symbol table was set before
-    the random seed was set, causing it to have a fixed value on many
-    platforms.
+  - CVE-2017-11343: The randomization factor of the symbol table was
+    set before the random seed was set, causing it to have a fixed value
+    on many platforms.
 
 - Core Libraries
   - Unit "posix": If file-lock, file-lock/blocking or file-unlock are
@@ -134,6 +134,8 @@
 
 - Build system
   - Fixed broken compilation on NetBSD, due to missing _NETBSD_SOURCE.
+  - Fixed compilation on DragonflyBSD due to no feature macro support
+    in its standard C library (thanks to Markus Pfeiffer).
 
 - Compiler
   - The scrutinizer no longer uses 'fixnum as the type for fixnums
Trap