This bug was fixed in the package linux-intel-iotg-5.15 - 5.15.0-1049.55~20.04.1
--------------- linux-intel-iotg-5.15 (5.15.0-1049.55~20.04.1) focal; urgency=medium
* focal/linux-intel-iotg-5.15: 5.15.0-1049.55~20.04.1 -proposed tracker (LP: #2052252)
[ Ubuntu: 5.15.0-1049.55 ]
* jammy/linux-intel-iotg: 5.15.0-1049.55 -proposed tracker (LP: #2052253) * jammy/linux: 5.15.0-97.107 -proposed tracker (LP: #2052600) * Packaging resync (LP: #1786013) - [Packaging] update annotations scripts * partproke is broken on empty loopback device (LP: #2049689) - block: Move checking GENHD_FL_NO_PART to bdev_add_partition() * CVE-2023-51781 - appletalk: Fix Use-After-Free in atalk_ioctl * CVE-2023-51780 - atm: Fix Use-After-Free in do_vcc_ioctl * CVE-2023-6915 - ida: Fix crash in ida_free when the bitmap is empty * CVE-2024-0565 - smb: client: fix OOB in receive_encrypted_standard() * CVE-2024-0646 - net: tls, update curr on splice as well
-- Philip Cox <email address hidden> Thu, 15 Feb 2024 09:46:07 -0500
This bug was fixed in the package linux-intel- iotg-5. 15 - 5.15.0- 1049.55~ 20.04.1
--------------- iotg-5. 15 (5.15.0- 1049.55~ 20.04.1) focal; urgency=medium
linux-intel-
* focal/linux- intel-iotg- 5.15: 5.15.0- 1049.55~ 20.04.1 -proposed tracker
(LP: #2052252)
[ Ubuntu: 5.15.0-1049.55 ]
* jammy/linux- intel-iotg: 5.15.0-1049.55 -proposed tracker (LP: #2052253) partition( ) encrypted_ standard( )
* jammy/linux: 5.15.0-97.107 -proposed tracker (LP: #2052600)
* Packaging resync (LP: #1786013)
- [Packaging] update annotations scripts
* partproke is broken on empty loopback device (LP: #2049689)
- block: Move checking GENHD_FL_NO_PART to bdev_add_
* CVE-2023-51781
- appletalk: Fix Use-After-Free in atalk_ioctl
* CVE-2023-51780
- atm: Fix Use-After-Free in do_vcc_ioctl
* CVE-2023-6915
- ida: Fix crash in ida_free when the bitmap is empty
* CVE-2024-0565
- smb: client: fix OOB in receive_
* CVE-2024-0646
- net: tls, update curr on splice as well
-- Philip Cox <email address hidden> Thu, 15 Feb 2024 09:46:07 -0500