This bug was fixed in the package linux-intel-iotg-5.15 - 5.15.0-1036.41~20.04.1
--------------- linux-intel-iotg-5.15 (5.15.0-1036.41~20.04.1) focal; urgency=medium
* focal/linux-intel-iotg-5.15: 5.15.0-1036.41~20.04.1 -proposed tracker (LP: #2026433)
[ Ubuntu: 5.15.0-1036.41 ]
* jammy/linux-intel-iotg: 5.15.0-1036.41 -proposed tracker (LP: #2026434) * jammy/linux: 5.15.0-78.85 -proposed tracker (LP: #2026448) * CVE-2023-35001 - netfilter: nf_tables: prevent OOB access in nft_byteorder_eval * CVE-2023-31248 - netfilter: nf_tables: do not ignore genmask when looking up chain by id * CVE-2023-3389 - io_uring: hold uring mutex around poll removal * CVE-2023-3439 - mctp: Add refcounts to mctp_dev - mctp: Allow MCTP on tun devices - mctp: make __mctp_dev_get() take a refcount hold - mctp: defer the kfree of object mdev->addrs * CVE-2023-3390 - netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE * CVE-2023-3090 - ipvlan:Fix out-of-bounds caused by unclear skb->cb * Packaging resync (LP: #1786013) - [Packaging] resync update-dkms-versions helper
[ Ubuntu: 5.15.0-1035.40 ]
* jammy/linux-intel-iotg: 5.15.0-1035.40 -proposed tracker (LP: #2027684) * add Fintek F81604 can controller support (LP: #2022887) - can: skb: move can_dropped_invalid_skb() and can_skb_headroom_valid() to skb.c - can: skb: drop tx skb if in listen only mode - can: skb: unify skb CAN frame identification helpers - can: dev: fix skb drop check - can: usb: f81604: add Fintek F81604 support - [Config]: updateconfigs for CONFIG_CAN_F81604
-- Jian Hui Lee <email address hidden> Tue, 18 Jul 2023 15:13:25 +0800
This bug was fixed in the package linux-intel- iotg-5. 15 - 5.15.0- 1036.41~ 20.04.1
--------------- iotg-5. 15 (5.15.0- 1036.41~ 20.04.1) focal; urgency=medium
linux-intel-
* focal/linux- intel-iotg- 5.15: 5.15.0- 1036.41~ 20.04.1 -proposed tracker
(LP: #2026433)
[ Ubuntu: 5.15.0-1036.41 ]
* jammy/linux- intel-iotg: 5.15.0-1036.41 -proposed tracker (LP: #2026434) dkms-versions helper
* jammy/linux: 5.15.0-78.85 -proposed tracker (LP: #2026448)
* CVE-2023-35001
- netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
* CVE-2023-31248
- netfilter: nf_tables: do not ignore genmask when looking up chain by id
* CVE-2023-3389
- io_uring: hold uring mutex around poll removal
* CVE-2023-3439
- mctp: Add refcounts to mctp_dev
- mctp: Allow MCTP on tun devices
- mctp: make __mctp_dev_get() take a refcount hold
- mctp: defer the kfree of object mdev->addrs
* CVE-2023-3390
- netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
* CVE-2023-3090
- ipvlan:Fix out-of-bounds caused by unclear skb->cb
* Packaging resync (LP: #1786013)
- [Packaging] resync update-
[ Ubuntu: 5.15.0-1035.40 ]
* jammy/linux- intel-iotg: 5.15.0-1035.40 -proposed tracker (LP: #2027684) invalid_ skb() and can_skb_ headroom_ valid() to
* add Fintek F81604 can controller support (LP: #2022887)
- can: skb: move can_dropped_
skb.c
- can: skb: drop tx skb if in listen only mode
- can: skb: unify skb CAN frame identification helpers
- can: dev: fix skb drop check
- can: usb: f81604: add Fintek F81604 support
- [Config]: updateconfigs for CONFIG_CAN_F81604
-- Jian Hui Lee <email address hidden> Tue, 18 Jul 2023 15:13:25 +0800