This bug was fixed in the package linux-gcp - 5.4.0-1129.138
--------------- linux-gcp (5.4.0-1129.138) focal; urgency=medium
* focal/linux-gcp: 5.4.0-1129.138 -proposed tracker (LP: #2063662)
[ Ubuntu: 5.4.0-182.202 ]
* focal/linux: 5.4.0-182.202 -proposed tracker (LP: #2063685) * CVE-2023-52530 - wifi: mac80211: fix potential key use-after-free * CVE-2024-26622 - tomoyo: fix UAF write bug in tomoyo_write_control() * CVE-2024-26614 - tcp: make sure init the accept_queue's spinlocks once - ipv6: init the accept_queue's spinlocks in inet6_create * CVE-2023-47233 - wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach
-- Joseph Salisbury <email address hidden> Mon, 29 Apr 2024 12:18:57 -0400
This bug was fixed in the package linux-gcp - 5.4.0-1129.138
---------------
linux-gcp (5.4.0-1129.138) focal; urgency=medium
* focal/linux-gcp: 5.4.0-1129.138 -proposed tracker (LP: #2063662)
[ Ubuntu: 5.4.0-182.202 ]
* focal/linux: 5.4.0-182.202 -proposed tracker (LP: #2063685) write_control( ) detach
* CVE-2023-52530
- wifi: mac80211: fix potential key use-after-free
* CVE-2024-26622
- tomoyo: fix UAF write bug in tomoyo_
* CVE-2024-26614
- tcp: make sure init the accept_queue's spinlocks once
- ipv6: init the accept_queue's spinlocks in inet6_create
* CVE-2023-47233
- wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_
-- Joseph Salisbury <email address hidden> Mon, 29 Apr 2024 12:18:57 -0400