[ubuntu/focal-security] linux-iot 5.4.0-1039.40 (Accepted)
Andy Whitcroft
apw at canonical.com
Tue Jul 2 12:29:24 UTC 2024
linux-iot (5.4.0-1039.40) focal; urgency=medium
* focal/linux-iot: 5.4.0-1039.40 -proposed tracker (LP: #2068280)
[ Ubuntu: 5.4.0-187.207 ]
* focal/linux: 5.4.0-187.207 -proposed tracker (LP: #2068291)
* CVE-2024-26925
- netfilter: Cleanup nft_net->module_list from nf_tables_exit_net()
- netfilter: nf_tables: release batch on table validation from abort path
- netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
* CVE-2024-26643
- netfilter: nf_tables: mark set as dead when unbinding anonymous set with
timeout
* CVE-2024-2201
- x86/cpufeatures: Add new word for scattered features
- x86/cpufeatures: Add CPUID_LNX_5 to track recently added Linux-defined word
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- x86/bhi: Add support for clearing branch history at syscall entry
- x86/bhi: Define SPEC_CTRL_BHI_DIS_S
- x86/bhi: Enumerate Branch History Injection (BHI) bug
- x86/bhi: Add BHI mitigation knob
- x86/bhi: Mitigate KVM by default
- [Config] updateconfigs for CONFIG_BHI_{AUTO|ON|OFF}
- x86/bugs: Fix BHI documentation
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr'
- x86/bugs: Fix BHI handling of RRSBA
- x86/bugs: Clarify that syscall hardening isn't a BHI mitigation
- x86/bugs: Fix BHI retpoline check
Date: 2024-06-17 10:15:32.440741+00:00
Changed-By: Jesse Sung <jesse.sung at canonical.com>
Signed-By: Andy Whitcroft <apw at canonical.com>
https://launchpad.net/ubuntu/+source/linux-iot/5.4.0-1039.40
-------------- next part --------------
Sorry, changesfile not available.
More information about the Focal-changes
mailing list