This bug was fixed in the package linux-starfive-5.17 - 5.17.0-1012.13
--------------- linux-starfive-5.17 (5.17.0-1012.13) jammy; urgency=medium
* jammy/linux-starfive-5.17: 5.17.0-1012.13 -proposed tracker (LP: #1997083)
[ Ubuntu: 5.17.0-14.15~22.04.8 ]
* jammy/linux-hwe-5.17: 5.17.0-14.15~22.04.8 -proposed tracker (LP: #1997084) * CVE-2022-42703 - mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse * CVE-2022-3566 - tcp: Fix data races around icsk->icsk_af_ops. * CVE-2022-3567 - ipv6: Fix data races around sk->sk_prot. * CVE-2022-3564 - Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu * CVE-2022-3524 - tcp/udp: Fix memory leak in ipv6_renew_options(). * CVE-2022-3621 - nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level() * CVE-2022-3594 - r8152: Rate limit overflow messages * CVE-2022-43945 - SUNRPC: Fix svcxdr_init_decode's end-of-buffer calculation - SUNRPC: Fix svcxdr_init_encode's buflen calculation - NFSD: Protect against send buffer overflow in NFSv2 READDIR - NFSD: Protect against send buffer overflow in NFSv3 READDIR - NFSD: Protect against send buffer overflow in NFSv2 READ - NFSD: Protect against send buffer overflow in NFSv3 READ - NFSD: Remove "inline" directives on op_rsize_bop helpers - NFSD: Cap rsize_bop result based on send buffer size * CVE-2022-26365 - xen/blkfront: fix leaking data in shared pages * CVE-2022-33743 - xen-netfront: restore __skb_queue_tail() positioning in xennet_get_responses()
[ Ubuntu: 5.17.0-11.12~22.04.8 ]
* jammy/linux-hwe-5.17: 5.17.0-11.12~22.04.8 -proposed tracker (LP: #1992022) * Packaging resync (LP: #1786013) - [Packaging] update variants
-- Thadeu Lima de Souza Cascardo <email address hidden> Mon, 28 Nov 2022 06:16:18 -0300
This bug was fixed in the package linux-starfive-5.17 - 5.17.0-1012.13
---------------
linux-starfive-5.17 (5.17.0-1012.13) jammy; urgency=medium
* jammy/linux- starfive- 5.17: 5.17.0-1012.13 -proposed tracker (LP: #1997083)
[ Ubuntu: 5.17.0- 14.15~22. 04.8 ]
* jammy/linux- hwe-5.17: 5.17.0- 14.15~22. 04.8 -proposed tracker (LP: #1997084) e_sdu options( ). lookup_ at_level( ) init_decode' s end-of-buffer calculation init_encode' s buflen calculation get_responses( )
* CVE-2022-42703
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse
* CVE-2022-3566
- tcp: Fix data races around icsk->icsk_af_ops.
* CVE-2022-3567
- ipv6: Fix data races around sk->sk_prot.
* CVE-2022-3564
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassembl
* CVE-2022-3524
- tcp/udp: Fix memory leak in ipv6_renew_
* CVE-2022-3621
- nilfs2: fix NULL pointer dereference at nilfs_bmap_
* CVE-2022-3594
- r8152: Rate limit overflow messages
* CVE-2022-43945
- SUNRPC: Fix svcxdr_
- SUNRPC: Fix svcxdr_
- NFSD: Protect against send buffer overflow in NFSv2 READDIR
- NFSD: Protect against send buffer overflow in NFSv3 READDIR
- NFSD: Protect against send buffer overflow in NFSv2 READ
- NFSD: Protect against send buffer overflow in NFSv3 READ
- NFSD: Remove "inline" directives on op_rsize_bop helpers
- NFSD: Cap rsize_bop result based on send buffer size
* CVE-2022-26365
- xen/blkfront: fix leaking data in shared pages
* CVE-2022-33743
- xen-netfront: restore __skb_queue_tail() positioning in
xennet_
[ Ubuntu: 5.17.0- 11.12~22. 04.8 ]
* jammy/linux- hwe-5.17: 5.17.0- 11.12~22. 04.8 -proposed tracker (LP: #1992022)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
-- Thadeu Lima de Souza Cascardo <email address hidden> Mon, 28 Nov 2022 06:16:18 -0300