This bug was fixed in the package linux-riscv - 6.5.0-13.13.1
--------------- linux-riscv (6.5.0-13.13.1) mantic; urgency=medium
* mantic/linux-riscv: 6.5.0-13.13.1 -proposed tracker (LP: #2041875)
[ Ubuntu: 6.5.0-13.13 ]
* mantic/linux: 6.5.0-13.13 -proposed tracker (LP: #2042652) * arm64 atomic issues cause disk corruption (LP: #2042573) - locking/atomic: scripts: fix fallback ifdeffery
[ Ubuntu: 6.5.0-11.11 ]
* mantic/linux: 6.5.0-11.11 -proposed tracker (LP: #2041879) * CVE-2023-31085 - ubi: Refuse attaching if mtd's erasesize is 0 * CVE-2023-4244 - netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction * CVE-2023-5633 - drm/vmwgfx: Keep a gem reference to user bos in surfaces * CVE-2023-5345 - fs/smb/client: Reset password pointer to NULL * CVE-2023-5090 - x86: KVM: SVM: always update the x2avic msr interception * Packaging resync (LP: #1786013) - [Packaging] update helper scripts
-- Roxana Nicolescu <email address hidden> Tue, 07 Nov 2023 22:39:07 +0100
This bug was fixed in the package linux-riscv - 6.5.0-13.13.1
---------------
linux-riscv (6.5.0-13.13.1) mantic; urgency=medium
* mantic/linux-riscv: 6.5.0-13.13.1 -proposed tracker (LP: #2041875)
[ Ubuntu: 6.5.0-13.13 ]
* mantic/linux: 6.5.0-13.13 -proposed tracker (LP: #2042652)
* arm64 atomic issues cause disk corruption (LP: #2042573)
- locking/atomic: scripts: fix fallback ifdeffery
[ Ubuntu: 6.5.0-11.11 ]
* mantic/linux: 6.5.0-11.11 -proposed tracker (LP: #2041879)
* CVE-2023-31085
- ubi: Refuse attaching if mtd's erasesize is 0
* CVE-2023-4244
- netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
* CVE-2023-5633
- drm/vmwgfx: Keep a gem reference to user bos in surfaces
* CVE-2023-5345
- fs/smb/client: Reset password pointer to NULL
* CVE-2023-5090
- x86: KVM: SVM: always update the x2avic msr interception
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
-- Roxana Nicolescu <email address hidden> Tue, 07 Nov 2023 22:39:07 +0100