Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/netbsd-7-0]: src/doc 1071



details:   https://anonhg.NetBSD.org/src/rev/32deebdd4aa6
branches:  netbsd-7-0
changeset: 801108:32deebdd4aa6
user:      snj <snj%NetBSD.org@localhost>
date:      Fri Jan 08 21:06:57 2016 +0000

description:
1071

diffstat:

 doc/CHANGES-7.0.1 |  18 +++++++++++++++++-
 1 files changed, 17 insertions(+), 1 deletions(-)

diffs (29 lines):

diff -r 21b3c71ea33d -r 32deebdd4aa6 doc/CHANGES-7.0.1
--- a/doc/CHANGES-7.0.1 Fri Jan 08 21:06:07 2016 +0000
+++ b/doc/CHANGES-7.0.1 Fri Jan 08 21:06:57 2016 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-7.0.1,v 1.1.2.23 2016/01/05 22:27:26 snj Exp $
+# $NetBSD: CHANGES-7.0.1,v 1.1.2.24 2016/01/08 21:06:57 snj Exp $
 
 A complete list of changes from the NetBSD 7.0 release to the NetBSD 7.0.1
 release:
@@ -845,3 +845,19 @@
        * Make IPv6 address lower case.
        [taca, ticket #1055]
 
+sys/arch/xen/include/xen-public/io/ring.h      1.3 via patch
+sys/arch/xen/xen/pciback.c                     1.10 via patch
+sys/arch/xen/xen/xbdback_xenbus.c              1.62 via patch
+sys/arch/xen/xen/xennetback_xenbus.c           1.54 via patch
+
+       Apply patch from xsa155: make sure that the backend won't read
+       parts of the request again (possibly because of compiler
+       optimisations), by using copies and barrier.
+       From XSA155:
+       The compiler can emit optimizations in the PV backend drivers
+       which can lead to double fetch vulnerabilities. Specifically
+       the shared memory between the frontend and backend can be fetched
+       twice (during which time the frontend can alter the contents)
+       possibly leading to arbitrary code execution in backend.
+       [bouyer, ticket #1071]
+



Home | Main Index | Thread Index | Old Index