[ubuntu/trusty-proposed] linux 3.13.0-59.98 (Accepted)
Adam Conrad
adconrad at 0c3.net
Mon Jul 27 15:41:29 UTC 2015
linux (3.13.0-59.98) trusty; urgency=low
[ Colin Ian King ]
* SAUCE: KEYS: ensure we free the assoc array edit if edit is valid
- CVE-2015-1333
[ Upstream Kernel Changes ]
* x86_64, entry: Add missing 'DEFAULT_FRAME 0' entry annotations
* x86/debug: Drop several unnecessary CFI annotations
* x86, entry: Only call user_exit if TIF_NOHZ
* x86_64, entry: Treat regs->ax the same in fastpath and slowpath
syscalls
* x86: Speed up ___preempt_schedule*() by using THUNK helpers
* x86, entry: Switch stacks on a paranoid entry from userspace
* x86: entry_64.S: delete unused code
* x86: ia32entry.S: fix wrong symbolic constant usage: R11->ARGOFFSET
* x86: entry_64.S: fold SAVE_ARGS_IRQ macro into its sole user
* x86/asm/64: Open-code register save/restore in trace_hardirqs*() thunks
* x86/asm/entry/64: Always allocate a complete "struct pt_regs" on the
kernel stack
* x86/asm/entry/64: Fold the 'test_in_nmi' macro into its only user
* x86/asm/entry/64: Remove a redundant jump
* x86/asm/entry/64: Remove pointless jump to irq_return
* x86/nmi: Enable nested do_nmi handling for 64-bit kernels
* x86/nmi/64: Remove asm code that saves cr2
* x86/nmi/64: Switch stacks on userspace NMI entry
- CVE-2015-3290, CVE-2015-5157
* x86/nmi/64: Improve nested NMI comments
* x86/nmi/64: Reorder nested NMI checks
* x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI
detection
- CVE-2015-3291
Date: 2015-07-24 21:00:55.903265+00:00
Changed-By: Luis Henriques <luis.henriques at canonical.com>
Signed-By: Adam Conrad <adconrad at 0c3.net>
https://launchpad.net/ubuntu/+source/linux/3.13.0-59.98
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list