[RELEASED] [B][D][Patch 0/2] Fix FP/VMX vulnerabilities - CVE-2019-15030 and CVE-2019-15031 (LP: 1843533)

Stefan Bader stefan.bader at canonical.com
Wed Sep 18 12:37:25 UTC 2019


On 11.09.19 15:58, frank.heimes at canonical.com wrote:
> Buglink: https://bugs.launchpad.net/bugs/1843533
> 
> SRU Justification:
> 
> [Impact]
> 
> * Fix FP/VMX vulerabilities - CVE-2019-15030 and CVE-2019-15031
> 
> [Fix]
> 
> * a8318c13e79badb92bc6640704a64cc022a6eb97 a8318c1 "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts"
> 
> * 8205d5d98ef7f155de211f5e2eb6ca03d95a5a60 8205d5d "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction"
> 
> [Test Case]
> 
> * the commits point to a simple test case in tools/testing/selftests/powerpc/tm/tm-poison.c
> 
> [Regression Potential] 
> 
> * The regression potential can be considered as moderate
> 
> [Other Info]
> 
> * a8318c1 fixes CVE-2019-15031
> 
> * 8205d5d fixes CVE-2019-15030
> 
> * the commits are in 5.3, hence already in Eoan
> 
> * simple cherry-pick (on bionic master-next with '--strategy=recursive -X theirs -s -e -x') could be done
> 
> Gustavo Romero (2):
>   From: Gustavo Romero <gromero at linux.ibm.com>
>   From: Gustavo Romero <gromero at linux.ibm.com>
> 
>  arch/powerpc/kernel/process.c | 26 ++++----------------------
>  1 file changed, 4 insertions(+), 22 deletions(-)
> 

This has now already been released as part of the security update we just
released. Just to note that in the form submitted, patch #2 would not apply to
disco and would break the build in bionic. Test building and applying to the
desired releases would be highly appreciated in future submissions!

-Stefan


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20190918/35057599/attachment.sig>


More information about the kernel-team mailing list