This bug was fixed in the package linux-oem-5.17 - 5.17.0-1035.36
--------------- linux-oem-5.17 (5.17.0-1035.36) jammy; urgency=medium
* jammy/linux-oem-5.17: 5.17.0-1035.36 -proposed tracker (LP: #2026457)
* CVE-2023-2860 - ipv6: sr: fix out-of-bounds read when setting HMAC data.
* CVE-2023-35001 - netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
* CVE-2023-31248 - netfilter: nf_tables: do not ignore genmask when looking up chain by id
* Packaging resync (LP: #1786013) - [Packaging] resync update-dkms-versions helper - [Packaging] update annotations scripts
* CVE-2022-2663 - netfilter: nf_conntrack_irc: Fix forged IP logic - netfilter: nf_conntrack_irc: Tighten matching on DCC message
* CVE-2022-47929 - net: sched: disallow noqueue for qdisc classes
* CVE-2022-3635 - atm: idt77252: fix use-after-free bugs caused by tst_timer
-- Manuel Diewald <email address hidden> Wed, 12 Jul 2023 11:30:23 +0200
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1035.36
---------------
linux-oem-5.17 (5.17.0-1035.36) jammy; urgency=medium
* jammy/linux- oem-5.17: 5.17.0-1035.36 -proposed tracker (LP: #2026457)
* CVE-2023-2860
- ipv6: sr: fix out-of-bounds read when setting HMAC data.
* CVE-2023-35001
- netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
* CVE-2023-31248
- netfilter: nf_tables: do not ignore genmask when looking up chain by id
* Packaging resync (LP: #1786013) dkms-versions helper
- [Packaging] resync update-
- [Packaging] update annotations scripts
* CVE-2022-2663
- netfilter: nf_conntrack_irc: Fix forged IP logic
- netfilter: nf_conntrack_irc: Tighten matching on DCC message
* CVE-2022-47929
- net: sched: disallow noqueue for qdisc classes
* CVE-2022-3635
- atm: idt77252: fix use-after-free bugs caused by tst_timer
-- Manuel Diewald <email address hidden> Wed, 12 Jul 2023 11:30:23 +0200