← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1852141] Re: CVE-2019-0155: incomplete fix for 64-bit x86 kernels

 

This bug was fixed in the package linux - 5.0.0-36.39

---------------
linux (5.0.0-36.39) disco; urgency=medium

  * Ubuntu-5.0.0-33.35 introduces KVM regression with old Intel CPUs and Linux
    guests (LP: #1851709)
    - Revert "KVM: x86: Manually calculate reserved bits when loading PDPTRS"

  * Incomplete i915 fix for 64-bit x86 kernels (LP: #1852141) // CVE-2019-0155
    - SAUCE: drm/i915/cmdparser: Fix jump whitelist clearing

 -- Stefan Bader <stefan.bader@xxxxxxxxxxxxx>  Tue, 12 Nov 2019 10:33:14
+0100

** Changed in: linux (Ubuntu Bionic)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1852141

Title:
  CVE-2019-0155: incomplete fix for 64-bit x86 kernels

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Disco:
  Fix Released
Status in linux source package in Eoan:
  Fix Released

Bug description:
  [Impact]

  The initial set of Ubuntu kernel updates to address CVE-2019-0155 are
  not complete for 64-bit x86 kernels (amd64). The 32-bit x86 kernel
  (i386) updates are complete. It may be possible for an attacker to
  bypass the mitigations on 64-bit systems.

  The following upstream patch is needed:

  https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea0b163b13ffc52818c079adb00d55e227a6da6f

  [Test Case]

  Upstream has ran the proposed fix through their regression test suite.
  We don't have a reproducer for CVE-2019-0155 so the test case is
  simply to ensure that desktop graphics continue to work.

  [Regression Potential]

  Low, the fix is simple, tested, and, AAUI, the affected code path
  should only be legitimately used by the test suite.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852141/+subscriptions