[ubuntu/jammy-proposed] linux-riscv 5.15.0-1008.8 (Accepted)

Andy Whitcroft apw at canonical.com
Thu Apr 21 06:09:09 UTC 2022


linux-riscv (5.15.0-1008.8) jammy; urgency=medium

  * jammy/linux-riscv: 5.15.0-1008.8 -proposed tracker (LP: #1969506)

  [ Ubuntu: 5.15.0-27.28 ]

  * jammy/linux: 5.15.0-27.28 -proposed tracker (LP: #1968954)

  [ Ubuntu: 5.15.0-26.27 ]

  * jammy/linux: 5.15.0-26.27 -proposed tracker (LP: #1968850)
  * CVE-2022-1016
    - netfilter: nf_tables: initialize registers in nft_do_chain()
  * CVE-2022-1015
    - netfilter: nf_tables: validate registers coming from userspace.
  * CVE-2022-26490
    - nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION
  * harden indirect calls against BHI attacks (LP: #1967579)
    - objtool: Classify symbols
    - objtool: Explicitly avoid self modifying code in .altinstr_replacement
    - objtool: Shrink struct instruction
    - objtool,x86: Replace alternatives with .retpoline_sites
    - x86/retpoline: Remove unused replacement symbols
    - x86/asm: Fix register order
    - x86/asm: Fixup odd GEN-for-each-reg.h usage
    - x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
    - x86/retpoline: Create a retpoline thunk array
    - x86/alternative: Implement .retpoline_sites support
    - x86/alternative: Handle Jcc __x86_indirect_thunk_\reg
    - x86/alternative: Try inline spectre_v2=retpoline,amd
    - x86/alternative: Add debug prints to apply_retpolines()
    - bpf,x86: Simplify computing label offsets
    - bpf,x86: Respect X86_FEATURE_RETPOLINE*

Date: 2022-04-20 05:59:10.309537+00:00
Changed-By: Andrea Righi <andrea.righi at canonical.com>
Signed-By: Andy Whitcroft <apw at canonical.com>
https://launchpad.net/ubuntu/+source/linux-riscv/5.15.0-1008.8
-------------- next part --------------
Sorry, changesfile not available.


More information about the jammy-changes mailing list