This bug was fixed in the package linux-kvm - 5.4.0-1113.120
--------------- linux-kvm (5.4.0-1113.120) focal; urgency=medium
* focal/linux-kvm: 5.4.0-1113.120 -proposed tracker (LP: #2063675)
[ Ubuntu: 5.4.0-182.202 ]
* focal/linux: 5.4.0-182.202 -proposed tracker (LP: #2063685) * CVE-2023-52530 - wifi: mac80211: fix potential key use-after-free * CVE-2024-26622 - tomoyo: fix UAF write bug in tomoyo_write_control() * CVE-2024-26614 - tcp: make sure init the accept_queue's spinlocks once - ipv6: init the accept_queue's spinlocks in inet6_create * CVE-2023-47233 - wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach
-- Thibault Ferrante <email address hidden> Wed, 01 May 2024 14:48:27 +0200
This bug was fixed in the package linux-kvm - 5.4.0-1113.120
---------------
linux-kvm (5.4.0-1113.120) focal; urgency=medium
* focal/linux-kvm: 5.4.0-1113.120 -proposed tracker (LP: #2063675)
[ Ubuntu: 5.4.0-182.202 ]
* focal/linux: 5.4.0-182.202 -proposed tracker (LP: #2063685) write_control( ) detach
* CVE-2023-52530
- wifi: mac80211: fix potential key use-after-free
* CVE-2024-26622
- tomoyo: fix UAF write bug in tomoyo_
* CVE-2024-26614
- tcp: make sure init the accept_queue's spinlocks once
- ipv6: init the accept_queue's spinlocks in inet6_create
* CVE-2023-47233
- wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_
-- Thibault Ferrante <email address hidden> Wed, 01 May 2024 14:48:27 +0200