This bug was fixed in the package linux-kvm - 5.15.0-1038.43
--------------- linux-kvm (5.15.0-1038.43) jammy; urgency=medium
* jammy/linux-kvm: 5.15.0-1038.43 -proposed tracker (LP: #2026435)
[ Ubuntu: 5.15.0-78.85 ]
* jammy/linux: 5.15.0-78.85 -proposed tracker (LP: #2026448) * CVE-2023-35001 - netfilter: nf_tables: prevent OOB access in nft_byteorder_eval * CVE-2023-31248 - netfilter: nf_tables: do not ignore genmask when looking up chain by id * CVE-2023-3389 - io_uring: hold uring mutex around poll removal * CVE-2023-3439 - mctp: Add refcounts to mctp_dev - mctp: Allow MCTP on tun devices - mctp: make __mctp_dev_get() take a refcount hold - mctp: defer the kfree of object mdev->addrs * CVE-2023-3390 - netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE * CVE-2023-3090 - ipvlan:Fix out-of-bounds caused by unclear skb->cb * Packaging resync (LP: #1786013) - [Packaging] resync update-dkms-versions helper
-- Portia Stephens <email address hidden> Mon, 17 Jul 2023 10:49:08 +1000
This bug was fixed in the package linux-kvm - 5.15.0-1038.43
---------------
linux-kvm (5.15.0-1038.43) jammy; urgency=medium
* jammy/linux-kvm: 5.15.0-1038.43 -proposed tracker (LP: #2026435)
[ Ubuntu: 5.15.0-78.85 ]
* jammy/linux: 5.15.0-78.85 -proposed tracker (LP: #2026448) dkms-versions helper
* CVE-2023-35001
- netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
* CVE-2023-31248
- netfilter: nf_tables: do not ignore genmask when looking up chain by id
* CVE-2023-3389
- io_uring: hold uring mutex around poll removal
* CVE-2023-3439
- mctp: Add refcounts to mctp_dev
- mctp: Allow MCTP on tun devices
- mctp: make __mctp_dev_get() take a refcount hold
- mctp: defer the kfree of object mdev->addrs
* CVE-2023-3390
- netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
* CVE-2023-3090
- ipvlan:Fix out-of-bounds caused by unclear skb->cb
* Packaging resync (LP: #1786013)
- [Packaging] resync update-
-- Portia Stephens <email address hidden> Mon, 17 Jul 2023 10:49:08 +1000