APPLIED(B,D): [b,c,d] [PATCH 0/1] Fix for CVE-2019-13233
Khaled Elmously
khalid.elmously at canonical.com
Fri Jul 19 03:01:28 UTC 2019
Applied to B and D only as Stefan pointed out.
@Ben: FYI For some reason the commit subject gets corrupted when git am'ing this patch and ends up looking like this:
][PATCH 1/1] x86/insn-eval: Fix use-after-free access to LDT entry
I think the nested square-brackets in the subject might be tripping git up..or something
On 2019-07-16 13:08:23 , Benjamin M Romer wrote:
> Clean cherry-pick to b/c/d.
>
> CVE-2019-13233:
>
> In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is
> a use-after-free for access to an LDT entry because of a race condition
> between modify_ldt() and a #BR exception for an MPX bounds violation.
>
> Jann Horn (1):
> x86/insn-eval: Fix use-after-free access to LDT entry
>
> arch/x86/lib/insn-eval.c | 47 ++++++++++++++++++++--------------------
> 1 file changed, 24 insertions(+), 23 deletions(-)
>
> --
> 2.20.1
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list