ACK/CMNT: [X/B/D/E][SRU][PATCH 0/1] Fix for CVE-2019-13648

Tyler Hicks tyhicks at canonical.com
Fri Aug 9 15:59:52 UTC 2019


On 2019-07-26 16:57:54, Po-Hsu Lin wrote:
> In the Linux kernel through 5.2.1 on the powerpc platform, when hardware
> transactional memory is disabled, a local user can cause a denial of
> service (TM Bad Thing exception and system crash) via a sigreturn()
> system call that sends a crafted signal frame.
> 
> This patch can be cherry-picked into all the affected kernels,
> X, B, D and E. I'm sending two patches seperately as the one for B/D/E
> cannot be applied to X.

D and X look good to me:

 Acked-by: Tyler Hicks <tyhicks at canonical.com>

B has since picked up the patch via upstream linux-stable (Bionic commit
ad30c8361c159f3bdbaa7d10c71fc7dca690c4e6) so there's no longer a need to
apply this patch to B.

Thanks!

Tyler

> 
> https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13648.html
> 
> Michael Neuling (1):
>   powerpc/tm: Fix oops on sigreturn on systems without TM
> 
>  arch/powerpc/kernel/signal_32.c | 3 +++
>  arch/powerpc/kernel/signal_64.c | 5 +++++
>  2 files changed, 8 insertions(+)
> 
> -- 
> 2.7.4
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team



More information about the kernel-team mailing list