This bug was fixed in the package linux-gke-5.4 - 5.4.0-1067.70~18.04.1
--------------- linux-gke-5.4 (5.4.0-1067.70~18.04.1) bionic; urgency=medium
* bionic/linux-gke-5.4: 5.4.0-1067.70~18.04.1 -proposed tracker (LP: #1966256)
[ Ubuntu: 5.4.0-1067.70 ]
* focal/linux-gke: 5.4.0-1067.70 -proposed tracker (LP: #1966257) * focal/linux: 5.4.0-107.121 -proposed tracker (LP: #1966275) * CVE-2022-27666 - esp: Fix possible buffer overflow in ESP transformation * CVE-2022-1055 - net: sched: fix use-after-free in tc_new_tfilter() * Pick fixup from v5.4.176 upstream stable release to address cert failure with clock jitter test in NUC7i3DNHE (LP: #1964204) - Bluetooth: refactor malicious adv data check
-- Khalid Elmously <email address hidden> Wed, 30 Mar 2022 04:24:36 -0400
This bug was fixed in the package linux-gke-5.4 - 5.4.0-1067. 70~18.04. 1
--------------- 1067.70~ 18.04.1) bionic; urgency=medium
linux-gke-5.4 (5.4.0-
* bionic/ linux-gke- 5.4: 5.4.0-1067. 70~18.04. 1 -proposed tracker (LP: #1966256)
[ Ubuntu: 5.4.0-1067.70 ]
* focal/linux-gke: 5.4.0-1067.70 -proposed tracker (LP: #1966257)
* focal/linux: 5.4.0-107.121 -proposed tracker (LP: #1966275)
* CVE-2022-27666
- esp: Fix possible buffer overflow in ESP transformation
* CVE-2022-1055
- net: sched: fix use-after-free in tc_new_tfilter()
* Pick fixup from v5.4.176 upstream stable release to address cert
failure with clock jitter test in NUC7i3DNHE (LP: #1964204)
- Bluetooth: refactor malicious adv data check
-- Khalid Elmously <email address hidden> Wed, 30 Mar 2022 04:24:36 -0400