This bug was fixed in the package linux-lowlatency - 6.5.0-35.35.1
--------------- linux-lowlatency (6.5.0-35.35.1) mantic; urgency=medium
* mantic/linux-lowlatency: 6.5.0-35.35.1 -proposed tracker (LP: #2063567)
[ Ubuntu: 6.5.0-35.35 ]
* mantic/linux: 6.5.0-35.35 -proposed tracker (LP: #2063581) * cifs: Copying file to same directory results in page fault (LP: #2060919) - SAUCE: Revert "cifs: fix flushing folio regression for 6.1 backport" * CVE-2024-26805 - netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter * CVE-2024-26801 - Bluetooth: Avoid potential use-after-free in hci_error_reset * CVE-2024-26704 - ext4: fix double-free of blocks due to wrong extents moved_len * CVE-2023-52601 - jfs: fix array-index-out-of-bounds in dbAdjTree * CVE-2024-26635 - llc: Drop support for ETH_P_TR_802_2. * CVE-2024-26622 - tomoyo: fix UAF write bug in tomoyo_write_control() * CVE-2024-26614 - tcp: make sure init the accept_queue's spinlocks once - ipv6: init the accept_queue's spinlocks in inet6_create * CVE-2024-52615 - hwrng: core - Fix page fault dead lock on mmap-ed hwrng * CVE-2024-52602 - jfs: fix slab-out-of-bounds Read in dtSearch * CVE-2023-47233 - wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach * CVE-2024-2201 - x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file - x86/syscall: Don't force use of indirect calls for system calls - x86/bhi: Add support for clearing branch history at syscall entry - x86/bhi: Define SPEC_CTRL_BHI_DIS_S - x86/bhi: Enumerate Branch History Injection (BHI) bug - x86/bhi: Add BHI mitigation knob - x86/bhi: Mitigate KVM by default - KVM: x86: Add BHI_NO - [Config] Set CONFIG_BHI to enabled (auto)
-- Stefan Bader <email address hidden> Mon, 06 May 2024 17:02:26 +0200
This bug was fixed in the package linux-lowlatency - 6.5.0-35.35.1
---------------
linux-lowlatency (6.5.0-35.35.1) mantic; urgency=medium
* mantic/ linux-lowlatenc y: 6.5.0-35.35.1 -proposed tracker (LP: #2063567)
[ Ubuntu: 6.5.0-35.35 ]
* mantic/linux: 6.5.0-35.35 -proposed tracker (LP: #2063581) infoleak- after-free in __skb_datagram_iter out-of- bounds in dbAdjTree write_control( ) detach
* cifs: Copying file to same directory results in page fault (LP: #2060919)
- SAUCE: Revert "cifs: fix flushing folio regression for 6.1 backport"
* CVE-2024-26805
- netlink: Fix kernel-
* CVE-2024-26801
- Bluetooth: Avoid potential use-after-free in hci_error_reset
* CVE-2024-26704
- ext4: fix double-free of blocks due to wrong extents moved_len
* CVE-2023-52601
- jfs: fix array-index-
* CVE-2024-26635
- llc: Drop support for ETH_P_TR_802_2.
* CVE-2024-26622
- tomoyo: fix UAF write bug in tomoyo_
* CVE-2024-26614
- tcp: make sure init the accept_queue's spinlocks once
- ipv6: init the accept_queue's spinlocks in inet6_create
* CVE-2024-52615
- hwrng: core - Fix page fault dead lock on mmap-ed hwrng
* CVE-2024-52602
- jfs: fix slab-out-of-bounds Read in dtSearch
* CVE-2023-47233
- wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_
* CVE-2024-2201
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- x86/syscall: Don't force use of indirect calls for system calls
- x86/bhi: Add support for clearing branch history at syscall entry
- x86/bhi: Define SPEC_CTRL_BHI_DIS_S
- x86/bhi: Enumerate Branch History Injection (BHI) bug
- x86/bhi: Add BHI mitigation knob
- x86/bhi: Mitigate KVM by default
- KVM: x86: Add BHI_NO
- [Config] Set CONFIG_BHI to enabled (auto)
-- Stefan Bader <email address hidden> Mon, 06 May 2024 17:02:26 +0200