Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/netbsd-6-1]: src/doc 1358
details: https://anonhg.NetBSD.org/src/rev/1ef3e4ec4dd6
branches: netbsd-6-1
changeset: 776113:1ef3e4ec4dd6
user: snj <snj%NetBSD.org@localhost>
date: Fri Jan 08 21:25:54 2016 +0000
description:
1358
diffstat:
doc/CHANGES-6.1.6 | 19 ++++++++++++++++++-
1 files changed, 18 insertions(+), 1 deletions(-)
diffs (30 lines):
diff -r 42d8396a0d36 -r 1ef3e4ec4dd6 doc/CHANGES-6.1.6
--- a/doc/CHANGES-6.1.6 Fri Jan 08 21:25:28 2016 +0000
+++ b/doc/CHANGES-6.1.6 Fri Jan 08 21:25:54 2016 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-6.1.6,v 1.1.2.54 2015/11/18 07:44:37 msaitoh Exp $
+# $NetBSD: CHANGES-6.1.6,v 1.1.2.55 2016/01/08 21:25:54 snj Exp $
A complete list of changes from the NetBSD 6.1.5 release to the NetBSD 6.1.6
release:
@@ -6818,3 +6818,20 @@
Fix panic after "ifconfig gifX tunnel src dst" failed because of
duplicate pair address.
[knakahara, ticket #1345]
+
+sys/arch/xen/include/xen-public/io/ring.h 1.3 via patch
+sys/arch/xen/xen/pciback.c 1.10 via patch
+sys/arch/xen/xen/xbdback_xenbus.c 1.62 via patch
+sys/arch/xen/xen/xennetback_xenbus.c 1.54 via patch
+
+ Apply patch from xsa155: make sure that the backend won't read
+ parts of the request again (possibly because of compiler
+ optimisations), by using copies and barrier.
+ From XSA155:
+ The compiler can emit optimizations in the PV backend drivers
+ which can lead to double fetch vulnerabilities. Specifically
+ the shared memory between the frontend and backend can be fetched
+ twice (during which time the frontend can alter the contents)
+ possibly leading to arbitrary code execution in backend.
+ [bouyer, ticket #1358]
+
Home |
Main Index |
Thread Index |
Old Index