This bug was fixed in the package linux-kvm - 4.15.0-1134.139
--------------- linux-kvm (4.15.0-1134.139) bionic; urgency=medium
* bionic/linux-kvm: 4.15.0-1134.139 -proposed tracker (LP: #2001997)
[ Ubuntu: 4.15.0-202.213 ]
* bionic/linux: 4.15.0-202.213 -proposed tracker (LP: #2002005) * CVE-2022-3643 - xen/netback: Ensure protocol headers don't fall in the non-linear area * CVE-2022-45934 - Bluetooth: L2CAP: Fix u8 overflow * CVE-2022-42896 - Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm * CVE-2022-43945 - NFSD: Cap rsize_bop result based on send buffer size
-- Thadeu Lima de Souza Cascardo <email address hidden> Wed, 11 Jan 2023 00:48:15 -0300
This bug was fixed in the package linux-kvm - 4.15.0-1134.139
---------------
linux-kvm (4.15.0-1134.139) bionic; urgency=medium
* bionic/linux-kvm: 4.15.0-1134.139 -proposed tracker (LP: #2001997)
[ Ubuntu: 4.15.0-202.213 ]
* bionic/linux: 4.15.0-202.213 -proposed tracker (LP: #2002005) chan_by_ psm
* CVE-2022-3643
- xen/netback: Ensure protocol headers don't fall in the non-linear area
* CVE-2022-45934
- Bluetooth: L2CAP: Fix u8 overflow
* CVE-2022-42896
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- Bluetooth: L2CAP: Fix l2cap_global_
* CVE-2022-43945
- NFSD: Cap rsize_bop result based on send buffer size
-- Thadeu Lima de Souza Cascardo <email address hidden> Wed, 11 Jan 2023 00:48:15 -0300