Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/netbsd-6]: src/doc 1358



details:   https://anonhg.NetBSD.org/src/rev/b15f99758af1
branches:  netbsd-6
changeset: 777034:b15f99758af1
user:      snj <snj%NetBSD.org@localhost>
date:      Fri Jan 08 21:26:40 2016 +0000

description:
1358

diffstat:

 doc/CHANGES-6.2 |  18 +++++++++++++++++-
 1 files changed, 17 insertions(+), 1 deletions(-)

diffs (29 lines):

diff -r f0885d4e96f3 -r b15f99758af1 doc/CHANGES-6.2
--- a/doc/CHANGES-6.2   Fri Jan 08 21:26:15 2016 +0000
+++ b/doc/CHANGES-6.2   Fri Jan 08 21:26:40 2016 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-6.2,v 1.1.2.236 2015/11/18 06:52:21 msaitoh Exp $
+# $NetBSD: CHANGES-6.2,v 1.1.2.237 2016/01/08 21:26:40 snj Exp $
 
 A complete list of changes from the 6.1 release until the 6.2 release:
 
@@ -12737,3 +12737,19 @@
        getnetbyaddr and getnetbyname.
        [christos, ticket #1340]
 
+sys/arch/xen/include/xen-public/io/ring.h      1.3 via patch
+sys/arch/xen/xen/pciback.c                     1.10 via patch
+sys/arch/xen/xen/xbdback_xenbus.c              1.62 via patch
+sys/arch/xen/xen/xennetback_xenbus.c           1.54 via patch
+
+       Apply patch from xsa155: make sure that the backend won't read
+       parts of the request again (possibly because of compiler
+       optimisations), by using copies and barrier.
+       From XSA155:
+       The compiler can emit optimizations in the PV backend drivers
+       which can lead to double fetch vulnerabilities. Specifically
+       the shared memory between the frontend and backend can be fetched
+       twice (during which time the frontend can alter the contents)
+       possibly leading to arbitrary code execution in backend.
+       [bouyer, ticket #1358]
+



Home | Main Index | Thread Index | Old Index