This bug was fixed in the package linux-hwe-5.4 - 5.4.0-107.121~18.04.1
--------------- linux-hwe-5.4 (5.4.0-107.121~18.04.1) bionic; urgency=medium
* bionic/linux-hwe-5.4: 5.4.0-107.121~18.04.1 -proposed tracker (LP: #1966274)
[ Ubuntu: 5.4.0-107.121 ]
* focal/linux: 5.4.0-107.121 -proposed tracker (LP: #1966275) * CVE-2022-27666 - esp: Fix possible buffer overflow in ESP transformation * CVE-2022-1055 - net: sched: fix use-after-free in tc_new_tfilter() * Pick fixup from v5.4.176 upstream stable release to address cert failure with clock jitter test in NUC7i3DNHE (LP: #1964204) - Bluetooth: refactor malicious adv data check
-- Stefan Bader <email address hidden> Thu, 24 Mar 2022 18:02:34 +0100
This bug was fixed in the package linux-hwe-5.4 - 5.4.0-107. 121~18. 04.1
--------------- 107.121~ 18.04.1) bionic; urgency=medium
linux-hwe-5.4 (5.4.0-
* bionic/ linux-hwe- 5.4: 5.4.0-107. 121~18. 04.1 -proposed tracker (LP: #1966274)
[ Ubuntu: 5.4.0-107.121 ]
* focal/linux: 5.4.0-107.121 -proposed tracker (LP: #1966275)
* CVE-2022-27666
- esp: Fix possible buffer overflow in ESP transformation
* CVE-2022-1055
- net: sched: fix use-after-free in tc_new_tfilter()
* Pick fixup from v5.4.176 upstream stable release to address cert
failure with clock jitter test in NUC7i3DNHE (LP: #1964204)
- Bluetooth: refactor malicious adv data check
-- Stefan Bader <email address hidden> Thu, 24 Mar 2022 18:02:34 +0100