This bug was fixed in the package linux-aws-5.4 - 5.4.0-1094.102~18.04.1
--------------- linux-aws-5.4 (5.4.0-1094.102~18.04.1) bionic; urgency=medium
* bionic/linux-aws-5.4: 5.4.0-1094.102~18.04.1 -proposed tracker (LP: #2001935)
[ Ubuntu: 5.4.0-1094.102 ]
* focal/linux-aws: 5.4.0-1094.102 -proposed tracker (LP: #2001936) * focal/linux: 5.4.0-137.154 -proposed tracker (LP: #2001969) * CVE-2022-3643 - xen/netback: Ensure protocol headers don't fall in the non-linear area * CVE-2022-43945 - NFSD: Cap rsize_bop result based on send buffer size * CVE-2022-45934 - Bluetooth: L2CAP: Fix u8 overflow * CVE-2022-42896 - Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
-- Thadeu Lima de Souza Cascardo <email address hidden> Tue, 10 Jan 2023 17:11:43 -0300
This bug was fixed in the package linux-aws-5.4 - 5.4.0-1094. 102~18. 04.1
--------------- 1094.102~ 18.04.1) bionic; urgency=medium
linux-aws-5.4 (5.4.0-
* bionic/ linux-aws- 5.4: 5.4.0-1094. 102~18. 04.1 -proposed tracker
(LP: #2001935)
[ Ubuntu: 5.4.0-1094.102 ]
* focal/linux-aws: 5.4.0-1094.102 -proposed tracker (LP: #2001936) chan_by_ psm
* focal/linux: 5.4.0-137.154 -proposed tracker (LP: #2001969)
* CVE-2022-3643
- xen/netback: Ensure protocol headers don't fall in the non-linear area
* CVE-2022-43945
- NFSD: Cap rsize_bop result based on send buffer size
* CVE-2022-45934
- Bluetooth: L2CAP: Fix u8 overflow
* CVE-2022-42896
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- Bluetooth: L2CAP: Fix l2cap_global_
-- Thadeu Lima de Souza Cascardo <email address hidden> Tue, 10 Jan 2023 17:11:43 -0300