Module Name: src
Committed By: snj
Date: Sun Apr 8 06:22:03 UTC 2018
src/doc [netbsd-8]: CHANGES-8.0
To generate a diff of this commit:
cvs rdiff -u -r22.214.171.124 -r126.96.36.199 src/doc/CHANGES-8.0
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
diff -u src/doc/CHANGES-8.0:188.8.131.52 src/doc/CHANGES-8.0:184.108.40.206
--- src/doc/CHANGES-8.0:220.127.116.11 Thu Apr 5 18:18:00 2018
+++ src/doc/CHANGES-8.0 Sun Apr 8 06:22:03 2018
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-8.0,v 18.104.22.168 2018/04/05 18:18:00 martin Exp $
+# $NetBSD: CHANGES-8.0,v 22.214.171.124 2018/04/08 06:22:03 snj Exp $
A complete list of changes from the initial NetBSD 8.0 branch on 2017-06-04
until the 8.0 release:
@@ -10928,3 +10928,64 @@ sys/net/route.c 1.208
Kill remaining rt->rt_refcnt++
[ozaki-r, ticket #697]
+ When trying to decide the status of a weak symbol, resolve any
+ indirectness first. PR pkg/53089.
+ [joerg, ticket #698]
+ ed(1): add -S to disable ! commands.
+ patch(1): Pass -S to ed(1) so that patches containing ! commands
+ don't run commands. CVE-2018-0492.
+ [christos, ticket #699]
+ Change the iteration to make sure the ACPI_MCFG_ALLOCATION
+ structure we're reading fits the table we allocated.
+ [nonaka, ticket #700]
+ Make GARP work again when DAD is disabled.
+ [ozaki-r, ticket #701]
+ Lock the target cwdi and take an additional reference to the
+ vnode we are interested in to prevent it from disappearing
+ before getcwd_common(). PR kern/53096.
+ [hannken, ticket #702]
+ Use separate lock to protect internal state and release locks
+ when calling biodone.
+ [mlelstv, ticket #703]
+ Firmware after May 8, 2017 places APs in WFE state at boot. Add
+ a "sev" after writing the start vector, otherwise secondary CPUs
+ will not boot.
+ [mlelstv, ticket #704]
+ Don't read %cr2 here. %cr2 is initialized by the CPU only
+ during page faults (T_PAGEFLT), so here we're reading a value
+ that comes from a previous page fault.
+ That's a real problem; if you launch an unprivileged process, set
+ up a signal handler, make it sleep 10 seconds, and trigger a
+ T_ALIGNFLT fault, you get in si_addr the address of another LWP's
+ page - and perhaps this can be used to defeat userland ASLR.
+ [maxv, ticket #705]