APPLIED(B,D): [b,c,d] [PATCH 0/1] Fix for CVE-2019-13233

Khaled Elmously khalid.elmously at canonical.com
Fri Jul 19 03:01:28 UTC 2019


Applied to B and D only as Stefan pointed out.

@Ben: FYI For some reason the commit subject gets corrupted when git am'ing this patch and ends up looking like this:

    ][PATCH 1/1] x86/insn-eval: Fix use-after-free access to LDT entry

I think the nested square-brackets in the subject might be tripping git up..or something



On 2019-07-16 13:08:23 , Benjamin M Romer wrote:
> Clean cherry-pick to b/c/d.
> 
> CVE-2019-13233:
> 
> In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is 
> a use-after-free for access to an LDT entry because of a race condition 
> between modify_ldt() and a #BR exception for an MPX bounds violation.
> 
> Jann Horn (1):
>   x86/insn-eval: Fix use-after-free access to LDT entry
> 
>  arch/x86/lib/insn-eval.c | 47 ++++++++++++++++++++--------------------
>  1 file changed, 24 insertions(+), 23 deletions(-)
> 
> -- 
> 2.20.1
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team



More information about the kernel-team mailing list