[ubuntu/trusty-updates] linux-keystone 3.13.0-34.52 (Accepted)

Adam Conrad adconrad at 0c3.net
Mon Jul 27 16:46:58 UTC 2015


linux-keystone (3.13.0-34.52) trusty; urgency=low

  [ Luis Henriques ]

  * Rebase to Ubuntu-3.13.0-59.98

  [ Ubuntu: 3.13.0-59.98 ]

  * SAUCE: KEYS: ensure we free the assoc array edit if edit is valid
    - CVE-2015-1333
  * x86_64, entry: Add missing 'DEFAULT_FRAME 0' entry annotations
  * x86/debug: Drop several unnecessary CFI annotations
  * x86, entry: Only call user_exit if TIF_NOHZ
  * x86_64, entry: Treat regs->ax the same in fastpath and slowpath
    syscalls
  * x86: Speed up ___preempt_schedule*() by using THUNK helpers
  * x86, entry: Switch stacks on a paranoid entry from userspace
  * x86: entry_64.S: delete unused code
  * x86: ia32entry.S: fix wrong symbolic constant usage: R11->ARGOFFSET
  * x86: entry_64.S: fold SAVE_ARGS_IRQ macro into its sole user
  * x86/asm/64: Open-code register save/restore in trace_hardirqs*() thunks
  * x86/asm/entry/64: Always allocate a complete "struct pt_regs" on the
    kernel stack
  * x86/asm/entry/64: Fold the 'test_in_nmi' macro into its only user
  * x86/asm/entry/64: Remove a redundant jump
  * x86/asm/entry/64: Remove pointless jump to irq_return
  * x86/nmi: Enable nested do_nmi handling for 64-bit kernels
  * x86/nmi/64: Remove asm code that saves cr2
  * x86/nmi/64: Switch stacks on userspace NMI entry
    - CVE-2015-3290, CVE-2015-5157
  * x86/nmi/64: Improve nested NMI comments
  * x86/nmi/64: Reorder nested NMI checks
  * x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI
    detection
    - CVE-2015-3291

Date: 2015-07-24 21:02:12.009672+00:00
Changed-By: Luis Henriques <luis.henriques at canonical.com>
Signed-By: Adam Conrad <adconrad at 0c3.net>
https://launchpad.net/ubuntu/+source/linux-keystone/3.13.0-34.52
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list