This bug was fixed in the package linux-gcp-4.15 - 4.15.0-1120.134
--------------- linux-gcp-4.15 (4.15.0-1120.134) bionic; urgency=medium
* bionic/linux-gcp-4.15: 4.15.0-1120.134 -proposed tracker (LP: #1966294)
[ Ubuntu: 4.15.0-175.184 ]
* bionic/linux: 4.15.0-175.184 -proposed tracker (LP: #1966304) * CVE-2022-27666 - esp: Fix possible buffer overflow in ESP transformation
[ Ubuntu: 4.15.0-173.182 ]
* bionic/linux: 4.15.0-173.182 -proposed tracker (LP: #1965552) * Pick fixup from upstream stable patchset 2022-03-04 to address cert failure with clock jitter test on NUC7i3DNHE (LP: #1964213) - Bluetooth: refactor malicious adv data check
-- Khalid Elmously <email address hidden> Wed, 30 Mar 2022 00:33:11 -0400
This bug was fixed in the package linux-gcp-4.15 - 4.15.0-1120.134
---------------
linux-gcp-4.15 (4.15.0-1120.134) bionic; urgency=medium
* bionic/ linux-gcp- 4.15: 4.15.0-1120.134 -proposed tracker (LP: #1966294)
[ Ubuntu: 4.15.0-175.184 ]
* bionic/linux: 4.15.0-175.184 -proposed tracker (LP: #1966304)
* CVE-2022-27666
- esp: Fix possible buffer overflow in ESP transformation
[ Ubuntu: 4.15.0-173.182 ]
* bionic/linux: 4.15.0-173.182 -proposed tracker (LP: #1965552)
* Pick fixup from upstream stable patchset 2022-03-04 to address cert
failure with clock jitter test on NUC7i3DNHE (LP: #1964213)
- Bluetooth: refactor malicious adv data check
-- Khalid Elmously <email address hidden> Wed, 30 Mar 2022 00:33:11 -0400