This bug was fixed in the package linux - 6.2.0-37.38
--------------- linux (6.2.0-37.38) lunar; urgency=medium
* lunar/linux: 6.2.0-37.38 -proposed tracker (LP: #2041899)
* CVE-2023-31085 - ubi: Refuse attaching if mtd's erasesize is 0
* CVE-2023-25775 - RDMA/irdma: Prevent zero-length STAG registration
* CVE-2023-45871 - igb: set max size RX buffer when store bad packet is enabled
* CVE-2023-5345 - fs/smb/client: Reset password pointer to NULL
* CVE-2023-5090 - x86: KVM: SVM: always update the x2avic msr interception
* Packaging resync (LP: #1786013) - [Packaging] update helper scripts
-- Thadeu Lima de Souza Cascardo <email address hidden> Mon, 30 Oct 2023 16:27:35 -0300
This bug was fixed in the package linux - 6.2.0-37.38
---------------
linux (6.2.0-37.38) lunar; urgency=medium
* lunar/linux: 6.2.0-37.38 -proposed tracker (LP: #2041899)
* CVE-2023-31085
- ubi: Refuse attaching if mtd's erasesize is 0
* CVE-2023-25775
- RDMA/irdma: Prevent zero-length STAG registration
* CVE-2023-45871
- igb: set max size RX buffer when store bad packet is enabled
* CVE-2023-5345
- fs/smb/client: Reset password pointer to NULL
* CVE-2023-5090
- x86: KVM: SVM: always update the x2avic msr interception
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
-- Thadeu Lima de Souza Cascardo <email address hidden> Mon, 30 Oct 2023 16:27:35 -0300