[ubuntu/focal-security] linux-iot 5.4.0-1039.40 (Accepted)

Andy Whitcroft apw at canonical.com
Tue Jul 2 12:29:24 UTC 2024


linux-iot (5.4.0-1039.40) focal; urgency=medium

  * focal/linux-iot: 5.4.0-1039.40 -proposed tracker (LP: #2068280)

  [ Ubuntu: 5.4.0-187.207 ]

  * focal/linux: 5.4.0-187.207 -proposed tracker (LP: #2068291)
  * CVE-2024-26925
    - netfilter: Cleanup nft_net->module_list from nf_tables_exit_net()
    - netfilter: nf_tables: release batch on table validation from abort path
    - netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
  * CVE-2024-26643
    - netfilter: nf_tables: mark set as dead when unbinding anonymous set with
      timeout
  * CVE-2024-2201
    - x86/cpufeatures: Add new word for scattered features
    - x86/cpufeatures: Add CPUID_LNX_5 to track recently added Linux-defined word
    - x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
    - x86/bhi: Add support for clearing branch history at syscall entry
    - x86/bhi: Define SPEC_CTRL_BHI_DIS_S
    - x86/bhi: Enumerate Branch History Injection (BHI) bug
    - x86/bhi: Add BHI mitigation knob
    - x86/bhi: Mitigate KVM by default
    - [Config] updateconfigs for CONFIG_BHI_{AUTO|ON|OFF}
    - x86/bugs: Fix BHI documentation
    - x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES
    - x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr'
    - x86/bugs: Fix BHI handling of RRSBA
    - x86/bugs: Clarify that syscall hardening isn't a BHI mitigation
    - x86/bugs: Fix BHI retpoline check

Date: 2024-06-17 10:15:32.440741+00:00
Changed-By: Jesse Sung <jesse.sung at canonical.com>
Signed-By: Andy Whitcroft <apw at canonical.com>
https://launchpad.net/ubuntu/+source/linux-iot/5.4.0-1039.40
-------------- next part --------------
Sorry, changesfile not available.


More information about the Focal-changes mailing list