[ubuntu/bionic-security] linux-snapdragon 4.15.0-1122.131 (Accepted)

Andy Whitcroft apw at canonical.com
Tue Mar 8 21:40:35 UTC 2022


linux-snapdragon (4.15.0-1122.131) bionic; urgency=medium

  * Disable unprivileged BPF by default (LP: #1961338)
    - [Config] snapdragon: Enable CONFIG_BPF_UNPRIV_DEFAULT_OFF

  [ Ubuntu: 4.15.0-171.180 ]

  * CVE-2022-0001
    - cpu/SMT: create and export cpu_smt_possible()
    - x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
    - x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
    - SAUCE: x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
    - SAUCE: x86/speculation: Add eIBRS + Retpoline options
    - SAUCE: Documentation/hw-vuln: Update spectre doc
  * Disable unprivileged BPF by default (LP: #1961338)
    - bpf: Add kconfig knob for disabling unpriv bpf by default
    - [Config] set CONFIG_BPF_UNPRIV_DEFAULT_OFF=y

  [ Ubuntu: 4.15.0-169.177 ]

  * bionic/linux: 4.15.0-169.177 -proposed tracker (LP: #1959877)
  * ubuntu_kernel_selftests.ftrace:ftracetest fails with bionic:linux
    4.15.0-168.176 on s390x (LP: #1959752)
    - recordmcount.pl: fix typo in s390 mcount regex

Date: 2022-03-03 13:36:10.084125+00:00
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Signed-By: Andy Whitcroft <apw at canonical.com>
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1122.131
-------------- next part --------------
Sorry, changesfile not available.


More information about the Bionic-changes mailing list