This bug was fixed in the package linux-azure-5.15 - 5.15.0-1059.67~20.04.1
--------------- linux-azure-5.15 (5.15.0-1059.67~20.04.1) focal; urgency=medium
* focal/linux-azure-5.15: 5.15.0-1059.67~20.04.1 -proposed tracker (LP: #2055986)
* Packaging resync (LP: #1786013) - debian/dkms-versions -- update from kernel-versions (main/s2024.02.05)
[ Ubuntu: 5.15.0-1059.67 ]
* jammy/linux-azure: 5.15.0-1059.67 -proposed tracker (LP: #2055987) * jammy/linux: 5.15.0-101.111 -proposed tracker (LP: #2056026) * Packaging resync (LP: #1786013) - [Packaging] update annotations scripts - debian/dkms-versions -- update from kernel-versions (main/s2024.02.05) * CVE-2024-24855 - scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() * CVE-2024-1086 - netfilter: nf_tables: reject QUEUE/DROP verdict parameters * CVE-2024-1085 - netfilter: nf_tables: check if catch-all set element is active in next generation * CVE-2023-32247 - ksmbd: destroy expired sessions * CVE-2023-23000 - phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function
-- Noah Wager <email address hidden> Mon, 11 Mar 2024 15:52:47 -0700
This bug was fixed in the package linux-azure-5.15 - 5.15.0- 1059.67~ 20.04.1
--------------- 1059.67~ 20.04.1) focal; urgency=medium
linux-azure-5.15 (5.15.0-
* focal/linux- azure-5. 15: 5.15.0- 1059.67~ 20.04.1 -proposed tracker
(LP: #2055986)
* Packaging resync (LP: #1786013) dkms-versions -- update from kernel-versions (main/s2024.02.05)
- debian/
[ Ubuntu: 5.15.0-1059.67 ]
* jammy/linux-azure: 5.15.0-1059.67 -proposed tracker (LP: #2055987) dkms-versions -- update from kernel-versions (main/s2024.02.05) _fcf_rescan( ) find_port_ node function
* jammy/linux: 5.15.0-101.111 -proposed tracker (LP: #2056026)
* Packaging resync (LP: #1786013)
- [Packaging] update annotations scripts
- debian/
* CVE-2024-24855
- scsi: lpfc: Fix a possible data race in lpfc_unregister
* CVE-2024-1086
- netfilter: nf_tables: reject QUEUE/DROP verdict parameters
* CVE-2024-1085
- netfilter: nf_tables: check if catch-all set element is active in next
generation
* CVE-2023-32247
- ksmbd: destroy expired sessions
* CVE-2023-23000
- phy: tegra: xusb: Fix return value of tegra_xusb_
-- Noah Wager <email address hidden> Mon, 11 Mar 2024 15:52:47 -0700