This bug was fixed in the package linux-xilinx-zynqmp - 5.4.0-1044.48
--------------- linux-xilinx-zynqmp (5.4.0-1044.48) focal; urgency=medium
* focal/linux-xilinx-zynqmp: 5.4.0-1044.48 -proposed tracker (LP: #2063683)
[ Ubuntu: 5.4.0-182.202 ]
* focal/linux: 5.4.0-182.202 -proposed tracker (LP: #2063685) * CVE-2023-52530 - wifi: mac80211: fix potential key use-after-free * CVE-2024-26622 - tomoyo: fix UAF write bug in tomoyo_write_control() * CVE-2024-26614 - tcp: make sure init the accept_queue's spinlocks once - ipv6: init the accept_queue's spinlocks in inet6_create * CVE-2023-47233 - wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach
-- Portia Stephens <email address hidden> Tue, 07 May 2024 10:22:39 +1000
This bug was fixed in the package linux-xilinx-zynqmp - 5.4.0-1044.48
---------------
linux-xilinx-zynqmp (5.4.0-1044.48) focal; urgency=medium
* focal/linux- xilinx- zynqmp: 5.4.0-1044.48 -proposed tracker (LP: #2063683)
[ Ubuntu: 5.4.0-182.202 ]
* focal/linux: 5.4.0-182.202 -proposed tracker (LP: #2063685) write_control( ) detach
* CVE-2023-52530
- wifi: mac80211: fix potential key use-after-free
* CVE-2024-26622
- tomoyo: fix UAF write bug in tomoyo_
* CVE-2024-26614
- tcp: make sure init the accept_queue's spinlocks once
- ipv6: init the accept_queue's spinlocks in inet6_create
* CVE-2023-47233
- wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_
-- Portia Stephens <email address hidden> Tue, 07 May 2024 10:22:39 +1000