Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/netbsd-6]: src/doc 1358
details: https://anonhg.NetBSD.org/src/rev/b15f99758af1
branches: netbsd-6
changeset: 777034:b15f99758af1
user: snj <snj%NetBSD.org@localhost>
date: Fri Jan 08 21:26:40 2016 +0000
description:
1358
diffstat:
doc/CHANGES-6.2 | 18 +++++++++++++++++-
1 files changed, 17 insertions(+), 1 deletions(-)
diffs (29 lines):
diff -r f0885d4e96f3 -r b15f99758af1 doc/CHANGES-6.2
--- a/doc/CHANGES-6.2 Fri Jan 08 21:26:15 2016 +0000
+++ b/doc/CHANGES-6.2 Fri Jan 08 21:26:40 2016 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-6.2,v 1.1.2.236 2015/11/18 06:52:21 msaitoh Exp $
+# $NetBSD: CHANGES-6.2,v 1.1.2.237 2016/01/08 21:26:40 snj Exp $
A complete list of changes from the 6.1 release until the 6.2 release:
@@ -12737,3 +12737,19 @@
getnetbyaddr and getnetbyname.
[christos, ticket #1340]
+sys/arch/xen/include/xen-public/io/ring.h 1.3 via patch
+sys/arch/xen/xen/pciback.c 1.10 via patch
+sys/arch/xen/xen/xbdback_xenbus.c 1.62 via patch
+sys/arch/xen/xen/xennetback_xenbus.c 1.54 via patch
+
+ Apply patch from xsa155: make sure that the backend won't read
+ parts of the request again (possibly because of compiler
+ optimisations), by using copies and barrier.
+ From XSA155:
+ The compiler can emit optimizations in the PV backend drivers
+ which can lead to double fetch vulnerabilities. Specifically
+ the shared memory between the frontend and backend can be fetched
+ twice (during which time the frontend can alter the contents)
+ possibly leading to arbitrary code execution in backend.
+ [bouyer, ticket #1358]
+
Home |
Main Index |
Thread Index |
Old Index