This bug was fixed in the package linux-raspi - 5.4.0-1109.121
--------------- linux-raspi (5.4.0-1109.121) focal; urgency=medium
* focal/linux-raspi: 5.4.0-1109.121 -proposed tracker (LP: #2063650)
[ Ubuntu: 5.4.0-182.202 ]
* focal/linux: 5.4.0-182.202 -proposed tracker (LP: #2063685) * CVE-2023-52530 - wifi: mac80211: fix potential key use-after-free * CVE-2024-26622 - tomoyo: fix UAF write bug in tomoyo_write_control() * CVE-2024-26614 - tcp: make sure init the accept_queue's spinlocks once - ipv6: init the accept_queue's spinlocks in inet6_create * CVE-2023-47233 - wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach
-- Manuel Diewald <email address hidden> Mon, 06 May 2024 09:13:14 +0200
This bug was fixed in the package linux-raspi - 5.4.0-1109.121
---------------
linux-raspi (5.4.0-1109.121) focal; urgency=medium
* focal/linux-raspi: 5.4.0-1109.121 -proposed tracker (LP: #2063650)
[ Ubuntu: 5.4.0-182.202 ]
* focal/linux: 5.4.0-182.202 -proposed tracker (LP: #2063685) write_control( ) detach
* CVE-2023-52530
- wifi: mac80211: fix potential key use-after-free
* CVE-2024-26622
- tomoyo: fix UAF write bug in tomoyo_
* CVE-2024-26614
- tcp: make sure init the accept_queue's spinlocks once
- ipv6: init the accept_queue's spinlocks in inet6_create
* CVE-2023-47233
- wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_
-- Manuel Diewald <email address hidden> Mon, 06 May 2024 09:13:14 +0200