This bug was fixed in the package linux-oem-5.14 - 5.14.0-1055.62
--------------- linux-oem-5.14 (5.14.0-1055.62) focal; urgency=medium
* focal/linux-oem-5.14: 5.14.0-1055.62 -proposed tracker (LP: #1997413)
* CVE-2022-42703 - mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse
* CVE-2022-3566 - tcp: Fix data races around icsk->icsk_af_ops.
* CVE-2022-3567 - ipv6: annotate some data-races around sk->sk_prot - ipv6: Fix data races around sk->sk_prot.
* CVE-2022-3564 - Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
* CVE-2022-3524 - tcp/udp: Fix memory leak in ipv6_renew_options().
* CVE-2022-3621 - nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
* CVE-2022-3594 - r8152: Rate limit overflow messages
* CVE-2022-43945 - SUNRPC: Fix svcxdr_init_decode's end-of-buffer calculation - SUNRPC: Fix svcxdr_init_encode's buflen calculation - NFSD: Protect against send buffer overflow in NFSv2 READDIR - NFSD: Protect against send buffer overflow in NFSv3 READDIR - NFSD: Protect against send buffer overflow in NFSv2 READ - NFSD: Protect against send buffer overflow in NFSv3 READ - NFSD: Remove "inline" directives on op_rsize_bop helpers - NFSD: Cap rsize_bop result based on send buffer size
* CVE-2022-26365 - xen/blkfront: fix leaking data in shared pages
* CVE-2022-33743 - xen-netfront: restore __skb_queue_tail() positioning in xennet_get_responses()
-- Timo Aaltonen <email address hidden> Tue, 29 Nov 2022 17:37:05 +0200
This bug was fixed in the package linux-oem-5.14 - 5.14.0-1055.62
---------------
linux-oem-5.14 (5.14.0-1055.62) focal; urgency=medium
* focal/linux- oem-5.14: 5.14.0-1055.62 -proposed tracker (LP: #1997413)
* CVE-2022-42703
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse
* CVE-2022-3566
- tcp: Fix data races around icsk->icsk_af_ops.
* CVE-2022-3567
- ipv6: annotate some data-races around sk->sk_prot
- ipv6: Fix data races around sk->sk_prot.
* CVE-2022-3564 e_sdu
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassembl
* CVE-2022-3524 options( ).
- tcp/udp: Fix memory leak in ipv6_renew_
* CVE-2022-3621 lookup_ at_level( )
- nilfs2: fix NULL pointer dereference at nilfs_bmap_
* CVE-2022-3594
- r8152: Rate limit overflow messages
* CVE-2022-43945 init_decode' s end-of-buffer calculation init_encode' s buflen calculation
- SUNRPC: Fix svcxdr_
- SUNRPC: Fix svcxdr_
- NFSD: Protect against send buffer overflow in NFSv2 READDIR
- NFSD: Protect against send buffer overflow in NFSv3 READDIR
- NFSD: Protect against send buffer overflow in NFSv2 READ
- NFSD: Protect against send buffer overflow in NFSv3 READ
- NFSD: Remove "inline" directives on op_rsize_bop helpers
- NFSD: Cap rsize_bop result based on send buffer size
* CVE-2022-26365
- xen/blkfront: fix leaking data in shared pages
* CVE-2022-33743 get_responses( )
- xen-netfront: restore __skb_queue_tail() positioning in
xennet_
-- Timo Aaltonen <email address hidden> Tue, 29 Nov 2022 17:37:05 +0200