This bug was fixed in the package linux - 5.4.0-177.197

---------------
linux (5.4.0-177.197) focal; urgency=medium

  * focal/linux: 5.4.0-177.197 -proposed tracker (LP: #2059633)

  * Packaging resync (LP: #1786013)
    - [Packaging] drop getabis data

  * Remove getabis scripts (LP: #2059143)
    - [Packaging] Remove getabis

  * CVE-2023-24023
    - Bluetooth: Add more enc key size check

  * CVE-2023-52600
    - jfs: fix uaf in jfs_evict_inode

  * Focal update: v5.4.269 upstream stable release (LP: #2058948) //
    CVE-2023-52603
    - UBSAN: array-index-out-of-bounds in dtSplitRoot

  * CVE-2024-26581
    - netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure
    - netfilter: nft_set_rbtree: skip end interval element from gc

  * CVE-2024-26589
    - bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS

 -- Manuel Diewald <manuel.diew...@canonical.com>  Thu, 28 Mar 2024
19:08:48 +0100

** Changed in: linux (Ubuntu Focal)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-24023

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-52603

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26581

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26589

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058948

Title:
  Focal update: v5.4.269 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2058948/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to