[ubuntu/jammy-security] linux-oracle 5.15.0-1003.5 (Accepted)

Andy Whitcroft apw at canonical.com
Wed Apr 27 19:45:19 UTC 2022


linux-oracle (5.15.0-1003.5) jammy; urgency=medium

  * jammy/linux-oracle: 5.15.0-1003.5 -proposed tracker (LP: #1969501)

  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/master)

  [ Ubuntu: 5.15.0-27.28 ]

  * jammy/linux: 5.15.0-27.28 -proposed tracker (LP: #1968954)

  [ Ubuntu: 5.15.0-26.27 ]

  * jammy/linux: 5.15.0-26.27 -proposed tracker (LP: #1968850)
  * CVE-2022-1016
    - netfilter: nf_tables: initialize registers in nft_do_chain()
  * CVE-2022-1015
    - netfilter: nf_tables: validate registers coming from userspace.
  * CVE-2022-26490
    - nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION
  * harden indirect calls against BHI attacks (LP: #1967579)
    - objtool: Classify symbols
    - objtool: Explicitly avoid self modifying code in .altinstr_replacement
    - objtool: Shrink struct instruction
    - objtool,x86: Replace alternatives with .retpoline_sites
    - x86/retpoline: Remove unused replacement symbols
    - x86/asm: Fix register order
    - x86/asm: Fixup odd GEN-for-each-reg.h usage
    - x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
    - x86/retpoline: Create a retpoline thunk array
    - x86/alternative: Implement .retpoline_sites support
    - x86/alternative: Handle Jcc __x86_indirect_thunk_\reg
    - x86/alternative: Try inline spectre_v2=retpoline,amd
    - x86/alternative: Add debug prints to apply_retpolines()
    - bpf,x86: Simplify computing label offsets
    - bpf,x86: Respect X86_FEATURE_RETPOLINE*

Date: 2022-04-20 04:47:09.798179+00:00
Changed-By: Paolo Pisati <paolo.pisati at canonical.com>
Signed-By: Andy Whitcroft <apw at canonical.com>
https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1003.5
-------------- next part --------------
Sorry, changesfile not available.


More information about the jammy-changes mailing list