This bug was fixed in the package linux-aws - 5.4.0-1144.154

---------------
linux-aws (5.4.0-1144.154) focal; urgency=medium

  * focal/linux-aws: 5.4.0-1144.154 -proposed tracker (LP: #2102590)

  * iommu/arm-smmu-v3: Don't reserve implementation defined register space
    (LP: #2067864)
    - iommu/arm-smmu-v3: Don't reserve implementation defined register space

  [ Ubuntu: 5.4.0-214.234 ]

  * focal/linux: 5.4.0-214.234 -proposed tracker (LP: #2102635)
  * CVE-2024-50256
    - netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
  * CVE-2025-21702
    - pfifo_tail_enqueue: Drop new packet when sch->limit == 0
  * CVE-2025-21703
    - netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
  * CVE-2024-26915
    - drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
  * CVE-2025-21700
    - net: sched: Disallow replacing of child qdisc from one parent to another
  * CVE-2024-46826
    - ELF: fix kernel.randomize_va_space double read
  * CVE-2024-56651
    - can: hi311x: hi3110_can_ist(): fix potential use-after-free
  * CVE-2024-53237
    - driver core: Introduce device_find_any_child() helper
    - Bluetooth: fix use-after-free in device_for_each_child()
  * CVE-2024-35958
    - net: ena: Fix incorrect descriptor free behavior
  * CVE-2024-49974
    - NFSD: Limit the number of concurrent async COPY operations
  * CVE-2021-47119
    - ext4: fix memory leak in ext4_fill_super
  * CVE-2024-56658
    - net: defer final 'struct net' free in netns dismantle
  * CVE-2024-35864
    - smb: client: fix potential UAF in smb2_is_valid_lease_break()
  * CVE-2024-35864/CVE-2024-26928
    - smb: client: fix potential UAF in cifs_debug_files_proc_show()

 -- Bethany Jamison <[email protected]>  Fri, 04 Apr 2025
13:28:19 -0500

** Changed in: linux-aws (Ubuntu Focal)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-47119

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26915

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26928

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35864

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35958

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-46826

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-49974

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50256

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53237

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56651

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56658

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21700

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21702

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21703

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067864

Title:
  iommu/arm-smmu-v3: Don't reserve implementation defined register space

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2067864/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to