group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #33383
[Bug 1852141] Re: CVE-2019-0155: incomplete fix for 64-bit x86 kernels
This bug was fixed in the package linux - 5.3.0-23.25
---------------
linux (5.3.0-23.25) eoan; urgency=medium
* Incomplete i915 fix for 64-bit x86 kernels (LP: #1852141) // CVE-2019-0155
- SAUCE: drm/i915/cmdparser: Fix jump whitelist clearing
-- Stefan Bader <stefan.bader@xxxxxxxxxxxxx> Tue, 12 Nov 2019 09:46:03
+0100
** Changed in: linux (Ubuntu Eoan)
Status: Fix Committed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-0155
** Changed in: linux (Ubuntu Disco)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1852141
Title:
CVE-2019-0155: incomplete fix for 64-bit x86 kernels
Status in linux package in Ubuntu:
Triaged
Status in linux source package in Xenial:
Fix Released
Status in linux source package in Bionic:
Fix Released
Status in linux source package in Disco:
Fix Released
Status in linux source package in Eoan:
Fix Released
Bug description:
[Impact]
The initial set of Ubuntu kernel updates to address CVE-2019-0155 are
not complete for 64-bit x86 kernels (amd64). The 32-bit x86 kernel
(i386) updates are complete. It may be possible for an attacker to
bypass the mitigations on 64-bit systems.
The following upstream patch is needed:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea0b163b13ffc52818c079adb00d55e227a6da6f
[Test Case]
Upstream has ran the proposed fix through their regression test suite.
We don't have a reproducer for CVE-2019-0155 so the test case is
simply to ensure that desktop graphics continue to work.
[Regression Potential]
Low, the fix is simple, tested, and, AAUI, the affected code path
should only be legitimately used by the test suite.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852141/+subscriptions