This bug was fixed in the package linux-gkeop - 5.4.0-1092.96
--------------- linux-gkeop (5.4.0-1092.96) focal; urgency=medium
* focal/linux-gkeop: 5.4.0-1092.96 -proposed tracker (LP: #2063663)
[ Ubuntu: 5.4.0-182.202 ]
* focal/linux: 5.4.0-182.202 -proposed tracker (LP: #2063685) * CVE-2023-52530 - wifi: mac80211: fix potential key use-after-free * CVE-2024-26622 - tomoyo: fix UAF write bug in tomoyo_write_control() * CVE-2024-26614 - tcp: make sure init the accept_queue's spinlocks once - ipv6: init the accept_queue's spinlocks in inet6_create * CVE-2023-47233 - wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach
-- Jacob Martin <email address hidden> Wed, 01 May 2024 10:50:07 -0500
This bug was fixed in the package linux-gkeop - 5.4.0-1092.96
---------------
linux-gkeop (5.4.0-1092.96) focal; urgency=medium
* focal/linux-gkeop: 5.4.0-1092.96 -proposed tracker (LP: #2063663)
[ Ubuntu: 5.4.0-182.202 ]
* focal/linux: 5.4.0-182.202 -proposed tracker (LP: #2063685) write_control( ) detach
* CVE-2023-52530
- wifi: mac80211: fix potential key use-after-free
* CVE-2024-26622
- tomoyo: fix UAF write bug in tomoyo_
* CVE-2024-26614
- tcp: make sure init the accept_queue's spinlocks once
- ipv6: init the accept_queue's spinlocks in inet6_create
* CVE-2023-47233
- wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_
-- Jacob Martin <email address hidden> Wed, 01 May 2024 10:50:07 -0500