This bug was fixed in the package linux-lowlatency - 5.19.0-1012.13
--------------- linux-lowlatency (5.19.0-1012.13) kinetic; urgency=medium
* kinetic/linux-lowlatency: 5.19.0-1012.13 -proposed tracker (LP: #1997427)
[ Ubuntu: 5.19.0-26.27 ]
* kinetic/linux: 5.19.0-26.27 -proposed tracker (LP: #1997434) * CVE-2022-3566 - tcp: Fix data races around icsk->icsk_af_ops. * CVE-2022-3567 - ipv6: Fix data races around sk->sk_prot. * CVE-2022-3621 - nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level() * CVE-2022-3565 - mISDN: fix use-after-free bugs in l1oip timer handlers * CVE-2022-3594 - r8152: Rate limit overflow messages * CVE-2022-3564 - Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu * CVE-2022-3524 - tcp/udp: Fix memory leak in ipv6_renew_options(). * CVE-2022-43945 - SUNRPC: Fix svcxdr_init_decode's end-of-buffer calculation - SUNRPC: Fix svcxdr_init_encode's buflen calculation - NFSD: Protect against send buffer overflow in NFSv2 READDIR - NFSD: Protect against send buffer overflow in NFSv3 READDIR - NFSD: Protect against send buffer overflow in NFSv2 READ - NFSD: Protect against send buffer overflow in NFSv3 READ - NFSD: Remove "inline" directives on op_rsize_bop helpers - NFSD: Cap rsize_bop result based on send buffer size
-- Thadeu Lima de Souza Cascardo <email address hidden> Thu, 24 Nov 2022 06:45:13 -0300
This bug was fixed in the package linux-lowlatency - 5.19.0-1012.13
---------------
linux-lowlatency (5.19.0-1012.13) kinetic; urgency=medium
* kinetic/ linux-lowlatenc y: 5.19.0-1012.13 -proposed tracker (LP: #1997427)
[ Ubuntu: 5.19.0-26.27 ]
* kinetic/linux: 5.19.0-26.27 -proposed tracker (LP: #1997434) lookup_ at_level( ) e_sdu options( ). init_decode' s end-of-buffer calculation init_encode' s buflen calculation
* CVE-2022-3566
- tcp: Fix data races around icsk->icsk_af_ops.
* CVE-2022-3567
- ipv6: Fix data races around sk->sk_prot.
* CVE-2022-3621
- nilfs2: fix NULL pointer dereference at nilfs_bmap_
* CVE-2022-3565
- mISDN: fix use-after-free bugs in l1oip timer handlers
* CVE-2022-3594
- r8152: Rate limit overflow messages
* CVE-2022-3564
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassembl
* CVE-2022-3524
- tcp/udp: Fix memory leak in ipv6_renew_
* CVE-2022-43945
- SUNRPC: Fix svcxdr_
- SUNRPC: Fix svcxdr_
- NFSD: Protect against send buffer overflow in NFSv2 READDIR
- NFSD: Protect against send buffer overflow in NFSv3 READDIR
- NFSD: Protect against send buffer overflow in NFSv2 READ
- NFSD: Protect against send buffer overflow in NFSv3 READ
- NFSD: Remove "inline" directives on op_rsize_bop helpers
- NFSD: Cap rsize_bop result based on send buffer size
-- Thadeu Lima de Souza Cascardo <email address hidden> Thu, 24 Nov 2022 06:45:13 -0300