Module Name: src Committed By: snj Date: Sun Apr 8 06:22:03 UTC 2018
Modified Files: src/doc [netbsd-8]: CHANGES-8.0 Log Message: tickets 698-705 To generate a diff of this commit: cvs rdiff -u -r1.1.2.165 -r1.1.2.166 src/doc/CHANGES-8.0 Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/doc/CHANGES-8.0 diff -u src/doc/CHANGES-8.0:1.1.2.165 src/doc/CHANGES-8.0:1.1.2.166 --- src/doc/CHANGES-8.0:1.1.2.165 Thu Apr 5 18:18:00 2018 +++ src/doc/CHANGES-8.0 Sun Apr 8 06:22:03 2018 @@ -1,4 +1,4 @@ -# $NetBSD: CHANGES-8.0,v 1.1.2.165 2018/04/05 18:18:00 martin Exp $ +# $NetBSD: CHANGES-8.0,v 1.1.2.166 2018/04/08 06:22:03 snj Exp $ A complete list of changes from the initial NetBSD 8.0 branch on 2017-06-04 until the 8.0 release: @@ -10928,3 +10928,64 @@ sys/net/route.c 1.208 Kill remaining rt->rt_refcnt++ [ozaki-r, ticket #697] +external/gpl3/binutils/dist/bfd/elflink.c 1.14 + + When trying to decide the status of a weak symbol, resolve any + indirectness first. PR pkg/53089. + [joerg, ticket #698] + +bin/ed/ed.1 1.32-1.33 +bin/ed/main.c 1.29 +usr.bin/patch/pch.c 1.29 + + ed(1): add -S to disable ! commands. + patch(1): Pass -S to ed(1) so that patches containing ! commands + don't run commands. CVE-2018-0492. + [christos, ticket #699] + +sys/dev/acpi/acpi_mcfg.c 1.6 + + Change the iteration to make sure the ACPI_MCFG_ALLOCATION + structure we're reading fits the table we allocated. + [nonaka, ticket #700] + +sys/netinet/in.c 1.227 +sys/netinet6/in6.c 1.265 +tests/net/arp/t_arp.sh 1.35-1.36 + + Make GARP work again when DAD is disabled. + [ozaki-r, ticket #701] + +sys/miscfs/procfs/procfs_vnops.c 1.203 + + Lock the target cwdi and take an additional reference to the + vnode we are interested in to prevent it from disappearing + before getcwd_common(). PR kern/53096. + [hannken, ticket #702] + +sys/dev/scsipi/st.c 1.234 +sys/dev/scsipi/stvar.h 1.26 + + Use separate lock to protect internal state and release locks + when calling biodone. + [mlelstv, ticket #703] + +sys/arch/evbarm/rpi/rpi_machdep.c 1.81 + + Firmware after May 8, 2017 places APs in WFE state at boot. Add + a "sev" after writing the start vector, otherwise secondary CPUs + will not boot. + [mlelstv, ticket #704] + +sys/arch/amd64/amd64/trap.c 1.113 + + Don't read %cr2 here. %cr2 is initialized by the CPU only + during page faults (T_PAGEFLT), so here we're reading a value + that comes from a previous page fault. + + That's a real problem; if you launch an unprivileged process, set + up a signal handler, make it sleep 10 seconds, and trigger a + T_ALIGNFLT fault, you get in si_addr the address of another LWP's + page - and perhaps this can be used to defeat userland ASLR. + [maxv, ticket #705] +