[ubuntu/bionic-security] linux-azure-4.15 4.15.0-1133.146 (Accepted)

Andy Whitcroft apw at canonical.com
Tue Mar 8 21:37:55 UTC 2022


linux-azure-4.15 (4.15.0-1133.146) bionic; urgency=medium

  * Disable unprivileged BPF by default (LP: #1961338)
    - [Config] azure-4.15: Enable ONFIG_BPF_UNPRIV_DEFAULT_OFF

  [ Ubuntu: 4.15.0-171.180 ]

  * CVE-2022-0001
    - cpu/SMT: create and export cpu_smt_possible()
    - x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
    - x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
    - SAUCE: x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
    - SAUCE: x86/speculation: Add eIBRS + Retpoline options
    - SAUCE: Documentation/hw-vuln: Update spectre doc
  * Disable unprivileged BPF by default (LP: #1961338)
    - bpf: Add kconfig knob for disabling unpriv bpf by default
    - [Config] set CONFIG_BPF_UNPRIV_DEFAULT_OFF=y

  [ Ubuntu: 4.15.0-169.177 ]

  * bionic/linux: 4.15.0-169.177 -proposed tracker (LP: #1959877)
  * ubuntu_kernel_selftests.ftrace:ftracetest fails with bionic:linux
    4.15.0-168.176 on s390x (LP: #1959752)
    - recordmcount.pl: fix typo in s390 mcount regex

Date: 2022-03-03 08:55:11.478266+00:00
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Signed-By: Andy Whitcroft <apw at canonical.com>
https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1133.146
-------------- next part --------------
Sorry, changesfile not available.


More information about the Bionic-changes mailing list