[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+5PVA7MZCryECtCVw1zLacEqvRWrsq3rSnZKPBJjcwC3e0h=g@mail.gmail.com>
Date: Fri, 24 Jul 2015 10:16:04 -0400
From: Josh Boyer <jwboyer@...oraproject.org>
To: Andy Lutomirski <luto@...capital.net>
Cc: oss security list <oss-security@...ts.openwall.com>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: Linux x86_64 NMI security issues
On Wed, Jul 22, 2015 at 2:12 PM, Andy Lutomirski <luto@...capital.net> wrote:
> Note: Several of these fixes each depend on a few patches immediately
> before them. The NMI stack switching fix also depends on changes made
> in 4.2 and will appear to apply but crash on older kernels. I have a
> different variant that's more portable.
Given that none of these are going to apply cleanly on older kernels,
do you have backports available for 4.1.y and the longterm stable
kernels?
josh
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists