lp:~apw/ubuntu/+source/linux/+git/trusty
- Get this repository:
-
git clone
https://git.launchpad.net/~apw/ubuntu/+source/linux/+git/trusty
Branches
Name | Last Modified | Last Commit |
---|---|---|
signing- |
2019-01-31 14:36:35 UTC |
UBUNTU: [Packaging] getabis -- support parsing a simple version
Author:
Andy Whitcroft
UBUNTU: [Packaging] getabis -- support parsing a simple version BugLink: http:// |
master | 2018-12-05 06:47:31 UTC |
UBUNTU: Ubuntu-3.13.0-164.214
Author:
Khaled El Mously
UBUNTU: Ubuntu- Signed-off-by: Khalid Elmously <khalid. |
CVE-2015-2390 | 2015-07-29 09:31:31 UTC |
x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI detection
Author:
Andy Lutomirski
x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI detection commit 810bc075f78ff2c We have a tricky bug in the nested NMI code: if we see RSP pointing This isn't quite true. A malicious userspace program can point RSP Fix it with a sneaky trick. Set DF in the region of code that the RSP (Note: other than paravirt, there's little need for all this complexity. Fixes CVE-2015-3291. Cc: stable@ |
1 → 3 of 3 results | First • Previous • Next • Last |