This bug was fixed in the package linux-riscv - 5.13.0-1019.21
--------------- linux-riscv (5.13.0-1019.21) impish; urgency=medium
* impish/linux-riscv: 5.13.0-1019.21 -proposed tracker (LP: #1966234)
[ Ubuntu: 5.13.0-39.44 ]
* impish/linux: 5.13.0-39.44 -proposed tracker (LP: #1966236) * CVE-2022-27666 - sock: remove one redundant SKB_FRAG_PAGE_ORDER macro - esp: Fix possible buffer overflow in ESP transformation * CVE-2022-1055 - net: sched: fix use-after-free in tc_new_tfilter()
-- Stefan Bader <email address hidden> Thu, 24 Mar 2022 16:58:45 +0100
This bug was fixed in the package linux-riscv - 5.13.0-1019.21
---------------
linux-riscv (5.13.0-1019.21) impish; urgency=medium
* impish/linux-riscv: 5.13.0-1019.21 -proposed tracker (LP: #1966234)
[ Ubuntu: 5.13.0-39.44 ]
* impish/linux: 5.13.0-39.44 -proposed tracker (LP: #1966236)
* CVE-2022-27666
- sock: remove one redundant SKB_FRAG_PAGE_ORDER macro
- esp: Fix possible buffer overflow in ESP transformation
* CVE-2022-1055
- net: sched: fix use-after-free in tc_new_tfilter()
-- Stefan Bader <email address hidden> Thu, 24 Mar 2022 16:58:45 +0100