[ubuntu/precise-security] linux-lts-trusty 3.13.0-61.100~precise1 (Accepted)

Adam Conrad adconrad at 0c3.net
Wed Jul 29 20:38:29 UTC 2015


linux-lts-trusty (3.13.0-61.100~precise1) precise; urgency=low

  [ Luis Henriques]

  * Re-work previous CVE backports to fix regression
    - LP: #1479093

  [ Upstream Kernel Changes ]

  * Revert "x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI
    detection"
  * Revert "x86/nmi/64: Reorder nested NMI checks"
  * Revert "x86/nmi/64: Improve nested NMI comments"
  * Revert "x86/nmi/64: Switch stacks on userspace NMI entry"
  * Revert "x86/nmi/64: Remove asm code that saves cr2"
  * Revert "x86/nmi: Enable nested do_nmi handling for 64-bit kernels"
  * Revert "x86/asm/entry/64: Remove pointless jump to irq_return"
  * Revert "x86/asm/entry/64: Remove a redundant jump"
  * Revert "x86/asm/entry/64: Fold the 'test_in_nmi' macro into its only
    user"
  * Revert "x86/asm/entry/64: Always allocate a complete "struct pt_regs"
    on the kernel stack"
  * Revert "x86/asm/64: Open-code register save/restore in
    trace_hardirqs*() thunks"
  * Revert "x86: entry_64.S: fold SAVE_ARGS_IRQ macro into its sole user"
  * Revert "x86: ia32entry.S: fix wrong symbolic constant usage:
    R11->ARGOFFSET"
  * Revert "x86: entry_64.S: delete unused code"
  * Revert "x86, entry: Switch stacks on a paranoid entry from userspace"
  * Revert "x86: Speed up ___preempt_schedule*() by using THUNK helpers"
  * Revert "x86_64, entry: Treat regs->ax the same in fastpath and slowpath
    syscalls"
  * Revert "x86, entry: Only call user_exit if TIF_NOHZ"
  * Revert "x86/debug: Drop several unnecessary CFI annotations"
  * Revert "x86_64, entry: Add missing 'DEFAULT_FRAME 0' entry annotations"
  * x86/asm/entry/64: Fold the 'test_in_nmi' macro into its only user
  * x86/asm/entry/64: Remove a redundant jump
  * x86/nmi: Enable nested do_nmi handling for 64-bit kernels
  * x86/nmi/64: Remove asm code that saves cr2
  * x86/nmi/64: Switch stacks on userspace NMI entry
    - CVE-2015-3290, CVE-2015-5157
  * x86/nmi/64: Improve nested NMI comments
  * x86/nmi/64: Reorder nested NMI checks
  * x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI
    detection
    - CVE-2015-3291

linux (3.13.0-59.98) trusty; urgency=low

  [ Colin Ian King ]

  * SAUCE: KEYS: ensure we free the assoc array edit if edit is valid
    - CVE-2015-1333

  [ Upstream Kernel Changes ]

  * x86_64, entry: Add missing 'DEFAULT_FRAME 0' entry annotations
  * x86/debug: Drop several unnecessary CFI annotations
  * x86, entry: Only call user_exit if TIF_NOHZ
  * x86_64, entry: Treat regs->ax the same in fastpath and slowpath
    syscalls
  * x86: Speed up ___preempt_schedule*() by using THUNK helpers
  * x86, entry: Switch stacks on a paranoid entry from userspace
  * x86: entry_64.S: delete unused code
  * x86: ia32entry.S: fix wrong symbolic constant usage: R11->ARGOFFSET
  * x86: entry_64.S: fold SAVE_ARGS_IRQ macro into its sole user
  * x86/asm/64: Open-code register save/restore in trace_hardirqs*() thunks
  * x86/asm/entry/64: Always allocate a complete "struct pt_regs" on the
    kernel stack
  * x86/asm/entry/64: Fold the 'test_in_nmi' macro into its only user
  * x86/asm/entry/64: Remove a redundant jump
  * x86/asm/entry/64: Remove pointless jump to irq_return
  * x86/nmi: Enable nested do_nmi handling for 64-bit kernels
  * x86/nmi/64: Remove asm code that saves cr2
  * x86/nmi/64: Switch stacks on userspace NMI entry
    - CVE-2015-3290, CVE-2015-5157
  * x86/nmi/64: Improve nested NMI comments
  * x86/nmi/64: Reorder nested NMI checks
  * x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI
    detection
    - CVE-2015-3291

Date: 2015-07-29 12:04:12.054603+00:00
Changed-By: Luis Henriques <luis.henriques at canonical.com>
Signed-By: Adam Conrad <adconrad at 0c3.net>
https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-61.100~precise1
-------------- next part --------------
Sorry, changesfile not available.


More information about the Precise-changes mailing list