[ubuntu/jammy-security] linux-gcp 5.15.0-1004.7 (Accepted)
Andy Whitcroft
apw at canonical.com
Tue Apr 26 08:20:21 UTC 2022
linux-gcp (5.15.0-1004.7) jammy; urgency=medium
* jammy/linux-gcp: 5.15.0-1004.7 -proposed tracker (LP: #1969492)
[ Ubuntu: 5.15.0-27.28 ]
* jammy/linux: 5.15.0-27.28 -proposed tracker (LP: #1968954)
[ Ubuntu: 5.15.0-26.27 ]
* jammy/linux: 5.15.0-26.27 -proposed tracker (LP: #1968850)
* CVE-2022-1016
- netfilter: nf_tables: initialize registers in nft_do_chain()
* CVE-2022-1015
- netfilter: nf_tables: validate registers coming from userspace.
* CVE-2022-26490
- nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION
* harden indirect calls against BHI attacks (LP: #1967579)
- objtool: Classify symbols
- objtool: Explicitly avoid self modifying code in .altinstr_replacement
- objtool: Shrink struct instruction
- objtool,x86: Replace alternatives with .retpoline_sites
- x86/retpoline: Remove unused replacement symbols
- x86/asm: Fix register order
- x86/asm: Fixup odd GEN-for-each-reg.h usage
- x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
- x86/retpoline: Create a retpoline thunk array
- x86/alternative: Implement .retpoline_sites support
- x86/alternative: Handle Jcc __x86_indirect_thunk_\reg
- x86/alternative: Try inline spectre_v2=retpoline,amd
- x86/alternative: Add debug prints to apply_retpolines()
- bpf,x86: Simplify computing label offsets
- bpf,x86: Respect X86_FEATURE_RETPOLINE*
Date: 2022-04-20 04:23:08.989221+00:00
Changed-By: Paolo Pisati <paolo.pisati at canonical.com>
Signed-By: Andy Whitcroft <apw at canonical.com>
https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1004.7
-------------- next part --------------
Sorry, changesfile not available.
More information about the jammy-changes
mailing list