Ubuntu 6134-1: Linux kernel (Intel IoTG) vulnerabilities
Summary
Update Instructions
The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.15.0-1030-intel-iotg 5.15.0-1030.35~20.04.1 linux-image-intel 5.15.0.1030.35~20.04.22 linux-image-intel-iotg 5.15.0.1030.35~20.04.22 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References
https://ubuntu.com/security/notices/USN-6134-1
CVE-2022-27672, CVE-2022-3707, CVE-2022-4129, CVE-2022-47929,
CVE-2022-4842, CVE-2023-0386, CVE-2023-0394, CVE-2023-0458,
CVE-2023-0459, CVE-2023-1073, CVE-2023-1074, CVE-2023-1075,
CVE-2023-1078, CVE-2023-1118, CVE-2023-1281, CVE-2023-1513,
CVE-2023-1652, CVE-2023-1829, CVE-2023-1872, CVE-2023-20938,
CVE-2023-21102, CVE-2023-2162, CVE-2023-26545, CVE-2023-32269
Package Information
https://launchpad.net/ubuntu/+source/linux-intel-iotg-5.15/5.15.0-1030.35~20.04.1