APPLIED: [SRU][F][PATCH 0/1] CVE-2024-42240
Stefan Bader
stefan.bader at canonical.com
Fri Oct 25 14:19:02 UTC 2024
On 17.10.24 22:58, Yuxuan Luo wrote:
> [Impact]
> When BHI mitigation is enabled, debug handler issues a warning that
> could have been avoided under certain circumstance.
>
> [Backport]
> Solved the context conflict due to missing UNTRAIN_RET macro in our
> trees.
>
> [Test]
> No more debugger warnings after the patch.
>
> [Where problems could occur]
> CPU single-step debugging and BHI mitigation might be affected.
>
> Alexandre Chartre (1):
> x86/bhi: Avoid warning in #DB handler due to BHI mitigation
>
> arch/x86/entry/entry_64_compat.S | 12 +++++++++---
> 1 file changed, 9 insertions(+), 3 deletions(-)
>
Applied to focal:linux/master-next. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 48643 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20241025/d8997ae8/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20241025/d8997ae8/attachment-0001.sig>
More information about the kernel-team
mailing list