[ubuntu/trusty-updates] linux 3.13.0-59.98 (Accepted)

Adam Conrad adconrad at 0c3.net
Mon Jul 27 16:48:13 UTC 2015


linux (3.13.0-59.98) trusty; urgency=low

  [ Colin Ian King ]

  * SAUCE: KEYS: ensure we free the assoc array edit if edit is valid
    - CVE-2015-1333

  [ Upstream Kernel Changes ]

  * x86_64, entry: Add missing 'DEFAULT_FRAME 0' entry annotations
  * x86/debug: Drop several unnecessary CFI annotations
  * x86, entry: Only call user_exit if TIF_NOHZ
  * x86_64, entry: Treat regs->ax the same in fastpath and slowpath
    syscalls
  * x86: Speed up ___preempt_schedule*() by using THUNK helpers
  * x86, entry: Switch stacks on a paranoid entry from userspace
  * x86: entry_64.S: delete unused code
  * x86: ia32entry.S: fix wrong symbolic constant usage: R11->ARGOFFSET
  * x86: entry_64.S: fold SAVE_ARGS_IRQ macro into its sole user
  * x86/asm/64: Open-code register save/restore in trace_hardirqs*() thunks
  * x86/asm/entry/64: Always allocate a complete "struct pt_regs" on the
    kernel stack
  * x86/asm/entry/64: Fold the 'test_in_nmi' macro into its only user
  * x86/asm/entry/64: Remove a redundant jump
  * x86/asm/entry/64: Remove pointless jump to irq_return
  * x86/nmi: Enable nested do_nmi handling for 64-bit kernels
  * x86/nmi/64: Remove asm code that saves cr2
  * x86/nmi/64: Switch stacks on userspace NMI entry
    - CVE-2015-3290, CVE-2015-5157
  * x86/nmi/64: Improve nested NMI comments
  * x86/nmi/64: Reorder nested NMI checks
  * x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI
    detection
    - CVE-2015-3291

Date: 2015-07-24 21:00:55.903265+00:00
Changed-By: Luis Henriques <luis.henriques at canonical.com>
Signed-By: Adam Conrad <adconrad at 0c3.net>
https://launchpad.net/ubuntu/+source/linux/3.13.0-59.98
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list