| @@ -1,14 +1,14 @@ | | | @@ -1,14 +1,14 @@ |
1 | # $NetBSD: CHANGES-6.2,v 1.1.2.308 2017/09/04 16:05:39 snj Exp $ | | 1 | # $NetBSD: CHANGES-6.2,v 1.1.2.309 2017/09/09 16:54:40 snj Exp $ |
2 | | | 2 | |
3 | A complete list of changes from the 6.1 release until the 6.2 release: | | 3 | A complete list of changes from the 6.1 release until the 6.2 release: |
4 | | | 4 | |
5 | doc/README.files patched by hand | | 5 | doc/README.files patched by hand |
6 | gnu/usr.bin/groff/tmac/mdoc.local patched by hand | | 6 | gnu/usr.bin/groff/tmac/mdoc.local patched by hand |
7 | sys/sys/param.h patched by hand | | 7 | sys/sys/param.h patched by hand |
8 | | | 8 | |
9 | Welcome to 6.1_STABLE! | | 9 | Welcome to 6.1_STABLE! |
10 | | | 10 | |
11 | sys/dev/usb/usb_quirks.c 1.78 | | 11 | sys/dev/usb/usb_quirks.c 1.78 |
12 | sys/dev/usb/usbdevs 1.639 | | 12 | sys/dev/usb/usbdevs 1.639 |
13 | sys/dev/usb/usbdevs.h regen | | 13 | sys/dev/usb/usbdevs.h regen |
14 | sys/dev/usb/usbdevs_data.h regen | | 14 | sys/dev/usb/usbdevs_data.h regen |
| @@ -20890,13 +20890,21 @@ sys/arch/evbmips/conf/MALTA64 1.8 | | | @@ -20890,13 +20890,21 @@ sys/arch/evbmips/conf/MALTA64 1.8 |
20890 | sys/arch/mips/mips/bds_emul.S 1.9 | | 20890 | sys/arch/mips/mips/bds_emul.S 1.9 |
20891 | | | 20891 | |
20892 | Re-enable the NOFPU and (renamed) FPEMUL options. None of the Malta | | 20892 | Re-enable the NOFPU and (renamed) FPEMUL options. None of the Malta |
20893 | CPU daughter cards currently supported by NetBSD have an FPU. | | 20893 | CPU daughter cards currently supported by NetBSD have an FPU. |
20894 | Fix FPU emulation. | | 20894 | Fix FPU emulation. |
20895 | [mrg, ticket #1499] | | 20895 | [mrg, ticket #1499] |
20896 | | | 20896 | |
20897 | sys/arch/sparc64/sparc64/compat_13_machdep.c 1.24 | | 20897 | sys/arch/sparc64/sparc64/compat_13_machdep.c 1.24 |
20898 | | | 20898 | |
20899 | Apply only CCR. Otherwise userland could set PSTATE_PRIV | | 20899 | Apply only CCR. Otherwise userland could set PSTATE_PRIV |
20900 | in %pstate and get kernel privileges on the hardware. | | 20900 | in %pstate and get kernel privileges on the hardware. |
20901 | [maxv, ticket #1501] | | 20901 | [maxv, ticket #1501] |
20902 | | | 20902 | |
| | | 20903 | sys/compat/linux32/arch/amd64/linux32_machdep.c 1.39 |
| | | 20904 | |
| | | 20905 | |
| | | 20906 | Fix a ring0 escalation vulnerability in compat_linux32 where the |
| | | 20907 | index of %cs is controlled by userland, making it easy to trigger |
| | | 20908 | the page fault and get kernel privileges. |
| | | 20909 | [maxv, ticket #1502] |
| | | 20910 | |