This bug was fixed in the package linux - 5.15.0-119.129 --------------- linux (5.15.0-119.129) jammy; urgency=medium
* jammy/linux: 5.15.0-119.129 -proposed tracker (LP: #2075665) * Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4 (LP: #2073267) - SAUCE: Revert "randomize_kstack: Improve entropy diffusion" * CVE-2024-26921 - inet: inet_defrag: prevent sk release while still in use * Jammy update: v5.15.162 upstream stable release (LP: #2073765) // CVE-2024-39484 - mmc: davinci: Don't strip remove function when driver is builtin * Jammy update: v5.15.162 upstream stable release (LP: #2073765) - mmc: davinci_mmc: Convert to platform remove callback returning void * CVE-2024-39292 - um: Add winch to winch_handlers before registering winch IRQ * CVE-2024-36901 - ipv6: prevent NULL dereference in ip6_output() * CVE-2024-26830 - i40e: Do not allow untrusted VF to remove administratively set MAC * CVE-2024-26680 - net: atlantic: Fix DMA mapping for PTP hwts ring * CVE-2023-52760 - gfs2: Fix slab-use-after-free in gfs2_qd_dealloc * CVE-2023-52629 - sh: push-switch: Reorder cleanup operations to avoid use-after-free bug -- Manuel Diewald <manuel.diew...@canonical.com> Fri, 02 Aug 2024 16:15:36 +0200 ** Changed in: linux (Ubuntu Jammy) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-52629 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-52760 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26680 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26830 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26921 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-36901 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-39292 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-39484 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073765 Title: Jammy update: v5.15.162 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2073765/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs