This bug was fixed in the package linux-raspi - 6.2.0-1017.19
--------------- linux-raspi (6.2.0-1017.19) lunar; urgency=medium
* lunar/linux-raspi: 6.2.0-1017.19 -proposed tracker (LP: #2041892)
* Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log - [Packaging] resync update-dkms-versions helper
[ Ubuntu: 6.2.0-37.38 ]
* lunar/linux: 6.2.0-37.38 -proposed tracker (LP: #2041899) * CVE-2023-31085 - ubi: Refuse attaching if mtd's erasesize is 0 * CVE-2023-25775 - RDMA/irdma: Prevent zero-length STAG registration * CVE-2023-45871 - igb: set max size RX buffer when store bad packet is enabled * CVE-2023-5345 - fs/smb/client: Reset password pointer to NULL * CVE-2023-5090 - x86: KVM: SVM: always update the x2avic msr interception * Packaging resync (LP: #1786013) - [Packaging] update helper scripts
-- Juerg Haefliger <email address hidden> Mon, 13 Nov 2023 13:27:20 +0100
This bug was fixed in the package linux-raspi - 6.2.0-1017.19
---------------
linux-raspi (6.2.0-1017.19) lunar; urgency=medium
* lunar/linux-raspi: 6.2.0-1017.19 -proposed tracker (LP: #2041892)
* Packaging resync (LP: #1786013) dkms-versions helper
- [Packaging] resync git-ubuntu-log
- [Packaging] resync update-
[ Ubuntu: 6.2.0-37.38 ]
* lunar/linux: 6.2.0-37.38 -proposed tracker (LP: #2041899)
* CVE-2023-31085
- ubi: Refuse attaching if mtd's erasesize is 0
* CVE-2023-25775
- RDMA/irdma: Prevent zero-length STAG registration
* CVE-2023-45871
- igb: set max size RX buffer when store bad packet is enabled
* CVE-2023-5345
- fs/smb/client: Reset password pointer to NULL
* CVE-2023-5090
- x86: KVM: SVM: always update the x2avic msr interception
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
-- Juerg Haefliger <email address hidden> Mon, 13 Nov 2023 13:27:20 +0100