ACK w/cmnt: [CVE-2014-9090] x86_64, traps: Stop using IST for #SS
Stefan Bader
stefan.bader at canonical.com
Mon Dec 8 11:49:35 UTC 2014
On 05.12.2014 14:51, Luis Henriques wrote:
> [ Re-sending as I missed some people on the CC list. Sorry! ]
>
> Following this email I am sending for review the CVE-2014-9090 fix
> backports for both Lucid (2.6.32) and Precise (3.2.0).
>
> I'm also CC'ing Debian mailing-lists, Moritz, Ben and Willy as these
> backports could be of interest both to Debian and to the 2.6.32 and
> 3.2 stable kernels.
>
> Andy Lutomirski (1):
> x86_64, traps: Stop using IST for #SS
>
> arch/x86/include/asm/page_32_types.h | 1 -
> arch/x86/include/asm/page_64_types.h | 11 +++++------
> arch/x86/kernel/dumpstack_64.c | 1 -
> arch/x86/kernel/entry_64.S | 2 +-
> arch/x86/kernel/traps.c | 13 +------------
> 5 files changed, 7 insertions(+), 21 deletions(-)
>
>
Ok those look to be ok. They miss a #define trace_stack_segment but then I did
not find any users (might be hidden by define macro magic)...
Not looked whether additional patches might be needed.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20141208/be8758a7/attachment.sig>
More information about the kernel-team
mailing list