Module Name:    src
Committed By:   snj
Date:           Fri Jan  8 21:05:37 UTC 2016

Modified Files:
        src/doc [netbsd-7]: CHANGES-7.1

Log Message:
1071


To generate a diff of this commit:
cvs rdiff -u -r1.1.2.43 -r1.1.2.44 src/doc/CHANGES-7.1

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/doc/CHANGES-7.1
diff -u src/doc/CHANGES-7.1:1.1.2.43 src/doc/CHANGES-7.1:1.1.2.44
--- src/doc/CHANGES-7.1:1.1.2.43	Tue Jan  5 22:29:48 2016
+++ src/doc/CHANGES-7.1	Fri Jan  8 21:05:37 2016
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-7.1,v 1.1.2.43 2016/01/05 22:29:48 snj Exp $
+# $NetBSD: CHANGES-7.1,v 1.1.2.44 2016/01/08 21:05:37 snj Exp $
 
 A complete list of changes from the NetBSD 7.0 release to the NetBSD 7.1
 release:
@@ -1736,3 +1736,19 @@ sys/arch/arm/conf/Makefile.arm			1.43
 	Make ARM BE8 work.
 	[martin, ticket #1058]
 
+sys/arch/xen/include/xen-public/io/ring.h	1.3 via patch
+sys/arch/xen/xen/pciback.c			1.10 via patch
+sys/arch/xen/xen/xbdback_xenbus.c		1.62 via patch
+sys/arch/xen/xen/xennetback_xenbus.c		1.54 via patch
+
+	Apply patch from xsa155: make sure that the backend won't read
+	parts of the request again (possibly because of compiler
+	optimisations), by using copies and barrier.
+	From XSA155:
+	The compiler can emit optimizations in the PV backend drivers
+	which can lead to double fetch vulnerabilities. Specifically
+	the shared memory between the frontend and backend can be fetched
+	twice (during which time the frontend can alter the contents)
+	possibly leading to arbitrary code execution in backend.
+	[bouyer, ticket #1071]
+

Reply via email to