This bug was fixed in the package linux-raspi - 5.4.0-1058.65
--------------- linux-raspi (5.4.0-1058.65) focal; urgency=medium
* focal/linux-raspi: 5.4.0-1058.65 -proposed tracker (LP: #1966269)
[ Ubuntu: 5.4.0-107.121 ]
* focal/linux: 5.4.0-107.121 -proposed tracker (LP: #1966275) * CVE-2022-27666 - esp: Fix possible buffer overflow in ESP transformation * CVE-2022-1055 - net: sched: fix use-after-free in tc_new_tfilter() * Pick fixup from v5.4.176 upstream stable release to address cert failure with clock jitter test in NUC7i3DNHE (LP: #1964204) - Bluetooth: refactor malicious adv data check
-- Juerg Haefliger <email address hidden> Fri, 25 Mar 2022 13:14:21 +0100
This bug was fixed in the package linux-raspi - 5.4.0-1058.65
---------------
linux-raspi (5.4.0-1058.65) focal; urgency=medium
* focal/linux-raspi: 5.4.0-1058.65 -proposed tracker (LP: #1966269)
[ Ubuntu: 5.4.0-107.121 ]
* focal/linux: 5.4.0-107.121 -proposed tracker (LP: #1966275)
* CVE-2022-27666
- esp: Fix possible buffer overflow in ESP transformation
* CVE-2022-1055
- net: sched: fix use-after-free in tc_new_tfilter()
* Pick fixup from v5.4.176 upstream stable release to address cert
failure with clock jitter test in NUC7i3DNHE (LP: #1964204)
- Bluetooth: refactor malicious adv data check
-- Juerg Haefliger <email address hidden> Fri, 25 Mar 2022 13:14:21 +0100