This bug was fixed in the package linux - 5.19.0-29.30
--------------- linux (5.19.0-29.30) kinetic; urgency=medium
* kinetic/linux: 5.19.0-29.30 -proposed tracker (LP: #1999799)
* CVE-2022-3643 - xen/netback: Ensure protocol headers don't fall in the non-linear area
* CVE-2022-45934 - Bluetooth: L2CAP: Fix u8 overflow
* CVE-2022-4378 - proc: proc_skip_spaces() shouldn't think it is working on C strings - proc: avoid integer type confusion in get_proc_long
* CVE-2022-42896 - Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
-- Thadeu Lima de Souza Cascardo <email address hidden> Wed, 04 Jan 2023 08:36:13 -0300
This bug was fixed in the package linux - 5.19.0-29.30
---------------
linux (5.19.0-29.30) kinetic; urgency=medium
* kinetic/linux: 5.19.0-29.30 -proposed tracker (LP: #1999799)
* CVE-2022-3643
- xen/netback: Ensure protocol headers don't fall in the non-linear area
* CVE-2022-45934
- Bluetooth: L2CAP: Fix u8 overflow
* CVE-2022-4378
- proc: proc_skip_spaces() shouldn't think it is working on C strings
- proc: avoid integer type confusion in get_proc_long
* CVE-2022-42896 chan_by_ psm
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- Bluetooth: L2CAP: Fix l2cap_global_
-- Thadeu Lima de Souza Cascardo <email address hidden> Wed, 04 Jan 2023 08:36:13 -0300