This bug was fixed in the package linux-gcp-5.15 - 5.15.0-1021.28~20.04.1
--------------- linux-gcp-5.15 (5.15.0-1021.28~20.04.1) focal; urgency=medium
[ Ubuntu: 5.15.0-1021.28 ]
* CVE-2022-2602 - SAUCE: io_uring/af_unix: defer registered files gc to io_uring release - SAUCE: io_uring/af_unix: fix memleak during unix GC * CVE-2022-41674 - mac80211: move CRC into struct ieee802_11_elems - mac80211: mlme: find auth challenge directly - mac80211: mesh: clean up rx_bcn_presp API - mac80211: always allocate struct ieee802_11_elems - mac80211: fix memory leaks with element parsing - SAUCE: wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() - SAUCE: wifi: cfg80211/mac80211: reject bad MBSSID elements - SAUCE: wifi: cfg80211: ensure length byte is present before access - SAUCE: wifi: mac80211_hwsim: avoid mac80211 warning on bad rate - SAUCE: wifi: cfg80211: update hidden BSSes to avoid WARN_ON * CVE-2022-42722 - SAUCE: wifi: mac80211: fix crash in beacon protection for P2P-device * CVE-2022-42721 - SAUCE: wifi: cfg80211: avoid nontransmitted BSS list corruption * CVE-2022-42720 - SAUCE: wifi: cfg80211: fix BSS refcounting bugs * CVE-2022-42719 - SAUCE: wifi: mac80211: fix MBSSID parsing use-after-free
-- Thadeu Lima de Souza Cascardo <email address hidden> Mon, 17 Oct 2022 08:17:13 -0300
This bug was fixed in the package linux-gcp-5.15 - 5.15.0- 1021.28~ 20.04.1
--------------- 1021.28~ 20.04.1) focal; urgency=medium
linux-gcp-5.15 (5.15.0-
[ Ubuntu: 5.15.0-1021.28 ]
* CVE-2022-2602 update_ notlisted_ nontrans( )
- SAUCE: io_uring/af_unix: defer registered files gc to io_uring release
- SAUCE: io_uring/af_unix: fix memleak during unix GC
* CVE-2022-41674
- mac80211: move CRC into struct ieee802_11_elems
- mac80211: mlme: find auth challenge directly
- mac80211: mesh: clean up rx_bcn_presp API
- mac80211: always allocate struct ieee802_11_elems
- mac80211: fix memory leaks with element parsing
- SAUCE: wifi: cfg80211: fix u8 overflow in
cfg80211_
- SAUCE: wifi: cfg80211/mac80211: reject bad MBSSID elements
- SAUCE: wifi: cfg80211: ensure length byte is present before access
- SAUCE: wifi: mac80211_hwsim: avoid mac80211 warning on bad rate
- SAUCE: wifi: cfg80211: update hidden BSSes to avoid WARN_ON
* CVE-2022-42722
- SAUCE: wifi: mac80211: fix crash in beacon protection for P2P-device
* CVE-2022-42721
- SAUCE: wifi: cfg80211: avoid nontransmitted BSS list corruption
* CVE-2022-42720
- SAUCE: wifi: cfg80211: fix BSS refcounting bugs
* CVE-2022-42719
- SAUCE: wifi: mac80211: fix MBSSID parsing use-after-free
-- Thadeu Lima de Souza Cascardo <email address hidden> Mon, 17 Oct 2022 08:17:13 -0300