ACK/CMNT: [X/B/D/E][SRU][PATCH 0/1] Fix for CVE-2019-13648
Tyler Hicks
tyhicks at canonical.com
Fri Aug 9 15:59:52 UTC 2019
On 2019-07-26 16:57:54, Po-Hsu Lin wrote:
> In the Linux kernel through 5.2.1 on the powerpc platform, when hardware
> transactional memory is disabled, a local user can cause a denial of
> service (TM Bad Thing exception and system crash) via a sigreturn()
> system call that sends a crafted signal frame.
>
> This patch can be cherry-picked into all the affected kernels,
> X, B, D and E. I'm sending two patches seperately as the one for B/D/E
> cannot be applied to X.
D and X look good to me:
Acked-by: Tyler Hicks <tyhicks at canonical.com>
B has since picked up the patch via upstream linux-stable (Bionic commit
ad30c8361c159f3bdbaa7d10c71fc7dca690c4e6) so there's no longer a need to
apply this patch to B.
Thanks!
Tyler
>
> https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13648.html
>
> Michael Neuling (1):
> powerpc/tm: Fix oops on sigreturn on systems without TM
>
> arch/powerpc/kernel/signal_32.c | 3 +++
> arch/powerpc/kernel/signal_64.c | 5 +++++
> 2 files changed, 8 insertions(+)
>
> --
> 2.7.4
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list