ACK w/cmnt: [CVE-2014-9090] x86_64, traps: Stop using IST for #SS

Stefan Bader stefan.bader at canonical.com
Mon Dec 8 11:49:35 UTC 2014


On 05.12.2014 14:51, Luis Henriques wrote:
> [ Re-sending as I missed some people on the CC list.  Sorry! ]
> 
> Following this email I am sending for review the CVE-2014-9090 fix
> backports for both Lucid (2.6.32) and Precise (3.2.0).
> 
> I'm also CC'ing Debian mailing-lists, Moritz, Ben and Willy as these
> backports could be of interest both to Debian and to the 2.6.32 and
> 3.2 stable kernels.
> 
> Andy Lutomirski (1):
>   x86_64, traps: Stop using IST for #SS
> 
>  arch/x86/include/asm/page_32_types.h |  1 -
>  arch/x86/include/asm/page_64_types.h | 11 +++++------
>  arch/x86/kernel/dumpstack_64.c       |  1 -
>  arch/x86/kernel/entry_64.S           |  2 +-
>  arch/x86/kernel/traps.c              | 13 +------------
>  5 files changed, 7 insertions(+), 21 deletions(-)
> 
> 
Ok those look to be ok. They miss a #define trace_stack_segment but then I did
not find any users (might be hidden by define macro magic)...
Not looked whether additional patches might be needed.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20141208/be8758a7/attachment.sig>


More information about the kernel-team mailing list