This bug was fixed in the package linux-oem-5.17 - 5.17.0-1030.31
--------------- linux-oem-5.17 (5.17.0-1030.31) jammy; urgency=medium
* jammy/linux-oem-5.17: 5.17.0-1030.31 -proposed tracker (LP: #2011919)
* Packaging resync (LP: #1786013) - [Packaging] update update.conf - debian/dkms-versions -- update from kernel-versions (main/2023.03.20)
* CVE-2022-4382 - USB: gadgetfs: Fix race between mounting and unmounting
* CVE-2023-23559 - wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
* CVE-2022-3903 - media: mceusb: Use new usb_control_msg_*() routines
* CVE-2023-1118 - media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
* CVE-2023-26607 - ntfs: fix use-after-free in ntfs_ucsncmp() - ntfs: fix out-of-bounds read in ntfs_attr_find()
* CVE-2022-21505 - lockdown: Fix kexec lockdown bypass with ima policy
* CVE-2023-1095 - netfilter: nf_tables: fix null deref due to zeroed list head
* CVE-2023-1074 - sctp: fail if no bound addresses can be used for a given scope
* CVE-2022-41849 - fbdev: smscufx: Fix use-after-free in ufx_ops_open()
* CVE-2023-1281 - net/sched: tcindex: update imperfect hash filters respecting rcu
-- Manuel Diewald <email address hidden> Fri, 31 Mar 2023 15:37:07 +0200
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1030.31
---------------
linux-oem-5.17 (5.17.0-1030.31) jammy; urgency=medium
* jammy/linux- oem-5.17: 5.17.0-1030.31 -proposed tracker (LP: #2011919)
* Packaging resync (LP: #1786013) dkms-versions -- update from kernel-versions (main/2023.03.20)
- [Packaging] update update.conf
- debian/
* CVE-2022-4382
- USB: gadgetfs: Fix race between mounting and unmounting
* CVE-2023-23559
- wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
* CVE-2022-3903
- media: mceusb: Use new usb_control_msg_*() routines
* CVE-2023-1118
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
* CVE-2023-26607
- ntfs: fix use-after-free in ntfs_ucsncmp()
- ntfs: fix out-of-bounds read in ntfs_attr_find()
* CVE-2022-21505
- lockdown: Fix kexec lockdown bypass with ima policy
* CVE-2023-1095
- netfilter: nf_tables: fix null deref due to zeroed list head
* CVE-2023-1074
- sctp: fail if no bound addresses can be used for a given scope
* CVE-2022-41849
- fbdev: smscufx: Fix use-after-free in ufx_ops_open()
* CVE-2023-1281
- net/sched: tcindex: update imperfect hash filters respecting rcu
-- Manuel Diewald <email address hidden> Fri, 31 Mar 2023 15:37:07 +0200