APPLIED: [SRU][F][PATCH 0/1] CVE-2024-42240

Stefan Bader stefan.bader at canonical.com
Fri Oct 25 14:19:02 UTC 2024


On 17.10.24 22:58, Yuxuan Luo wrote:
> [Impact]
> When BHI mitigation is enabled, debug handler issues a warning that
> could have been avoided under certain circumstance.
> 
> [Backport]
> Solved the context conflict due to missing UNTRAIN_RET macro in our
> trees.
> 
> [Test]
> No more debugger warnings after the patch.
> 
> [Where problems could occur]
> CPU single-step debugging and BHI mitigation might be affected.
> 
> Alexandre Chartre (1):
>    x86/bhi: Avoid warning in #DB handler due to BHI mitigation
> 
>   arch/x86/entry/entry_64_compat.S | 12 +++++++++---
>   1 file changed, 9 insertions(+), 3 deletions(-)
> 

Applied to focal:linux/master-next. Thanks.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 48643 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20241025/d8997ae8/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20241025/d8997ae8/attachment-0001.sig>


More information about the kernel-team mailing list