This bug was fixed in the package linux-raspi-5.4 - 5.4.0-1058.65~18.04.1
--------------- linux-raspi-5.4 (5.4.0-1058.65~18.04.1) bionic; urgency=medium
* bionic/linux-raspi-5.4: 5.4.0-1058.65~18.04.1 -proposed tracker (LP: #1966268)
[ Ubuntu: 5.4.0-1058.65 ]
* focal/linux-raspi: 5.4.0-1058.65 -proposed tracker (LP: #1966269) * focal/linux: 5.4.0-107.121 -proposed tracker (LP: #1966275) * CVE-2022-27666 - esp: Fix possible buffer overflow in ESP transformation * CVE-2022-1055 - net: sched: fix use-after-free in tc_new_tfilter() * Pick fixup from v5.4.176 upstream stable release to address cert failure with clock jitter test in NUC7i3DNHE (LP: #1964204) - Bluetooth: refactor malicious adv data check
-- Juerg Haefliger <email address hidden> Fri, 25 Mar 2022 15:43:35 +0100
This bug was fixed in the package linux-raspi-5.4 - 5.4.0-1058. 65~18.04. 1
--------------- 1058.65~ 18.04.1) bionic; urgency=medium
linux-raspi-5.4 (5.4.0-
* bionic/ linux-raspi- 5.4: 5.4.0-1058. 65~18.04. 1 -proposed tracker
(LP: #1966268)
[ Ubuntu: 5.4.0-1058.65 ]
* focal/linux-raspi: 5.4.0-1058.65 -proposed tracker (LP: #1966269)
* focal/linux: 5.4.0-107.121 -proposed tracker (LP: #1966275)
* CVE-2022-27666
- esp: Fix possible buffer overflow in ESP transformation
* CVE-2022-1055
- net: sched: fix use-after-free in tc_new_tfilter()
* Pick fixup from v5.4.176 upstream stable release to address cert
failure with clock jitter test in NUC7i3DNHE (LP: #1964204)
- Bluetooth: refactor malicious adv data check
-- Juerg Haefliger <email address hidden> Fri, 25 Mar 2022 15:43:35 +0100