[ubuntu/jammy-proposed] linux-riscv 5.15.0-1008.8 (Accepted)
Andy Whitcroft
apw at canonical.com
Thu Apr 21 06:09:09 UTC 2022
linux-riscv (5.15.0-1008.8) jammy; urgency=medium
* jammy/linux-riscv: 5.15.0-1008.8 -proposed tracker (LP: #1969506)
[ Ubuntu: 5.15.0-27.28 ]
* jammy/linux: 5.15.0-27.28 -proposed tracker (LP: #1968954)
[ Ubuntu: 5.15.0-26.27 ]
* jammy/linux: 5.15.0-26.27 -proposed tracker (LP: #1968850)
* CVE-2022-1016
- netfilter: nf_tables: initialize registers in nft_do_chain()
* CVE-2022-1015
- netfilter: nf_tables: validate registers coming from userspace.
* CVE-2022-26490
- nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION
* harden indirect calls against BHI attacks (LP: #1967579)
- objtool: Classify symbols
- objtool: Explicitly avoid self modifying code in .altinstr_replacement
- objtool: Shrink struct instruction
- objtool,x86: Replace alternatives with .retpoline_sites
- x86/retpoline: Remove unused replacement symbols
- x86/asm: Fix register order
- x86/asm: Fixup odd GEN-for-each-reg.h usage
- x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
- x86/retpoline: Create a retpoline thunk array
- x86/alternative: Implement .retpoline_sites support
- x86/alternative: Handle Jcc __x86_indirect_thunk_\reg
- x86/alternative: Try inline spectre_v2=retpoline,amd
- x86/alternative: Add debug prints to apply_retpolines()
- bpf,x86: Simplify computing label offsets
- bpf,x86: Respect X86_FEATURE_RETPOLINE*
Date: 2022-04-20 05:59:10.309537+00:00
Changed-By: Andrea Righi <andrea.righi at canonical.com>
Signed-By: Andy Whitcroft <apw at canonical.com>
https://launchpad.net/ubuntu/+source/linux-riscv/5.15.0-1008.8
-------------- next part --------------
Sorry, changesfile not available.
More information about the jammy-changes
mailing list