This bug was fixed in the package linux - 5.4.0-177.197 --------------- linux (5.4.0-177.197) focal; urgency=medium
* focal/linux: 5.4.0-177.197 -proposed tracker (LP: #2059633) * Packaging resync (LP: #1786013) - [Packaging] drop getabis data * Remove getabis scripts (LP: #2059143) - [Packaging] Remove getabis * CVE-2023-24023 - Bluetooth: Add more enc key size check * CVE-2023-52600 - jfs: fix uaf in jfs_evict_inode * Focal update: v5.4.269 upstream stable release (LP: #2058948) // CVE-2023-52603 - UBSAN: array-index-out-of-bounds in dtSplitRoot * CVE-2024-26581 - netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure - netfilter: nft_set_rbtree: skip end interval element from gc * CVE-2024-26589 - bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS -- Manuel Diewald <manuel.diew...@canonical.com> Thu, 28 Mar 2024 19:08:48 +0100 ** Changed in: linux (Ubuntu Focal) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-24023 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-52603 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26581 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26589 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2058948 Title: Focal update: v5.4.269 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2058948/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs