This bug was fixed in the package linux-gke - 5.4.0-1067.70
--------------- linux-gke (5.4.0-1067.70) focal; urgency=medium
* focal/linux-gke: 5.4.0-1067.70 -proposed tracker (LP: #1966257)
[ Ubuntu: 5.4.0-107.121 ]
* focal/linux: 5.4.0-107.121 -proposed tracker (LP: #1966275) * CVE-2022-27666 - esp: Fix possible buffer overflow in ESP transformation * CVE-2022-1055 - net: sched: fix use-after-free in tc_new_tfilter() * Pick fixup from v5.4.176 upstream stable release to address cert failure with clock jitter test in NUC7i3DNHE (LP: #1964204) - Bluetooth: refactor malicious adv data check
-- Khalid Elmously <email address hidden> Tue, 29 Mar 2022 23:19:08 -0400
This bug was fixed in the package linux-gke - 5.4.0-1067.70
---------------
linux-gke (5.4.0-1067.70) focal; urgency=medium
* focal/linux-gke: 5.4.0-1067.70 -proposed tracker (LP: #1966257)
[ Ubuntu: 5.4.0-107.121 ]
* focal/linux: 5.4.0-107.121 -proposed tracker (LP: #1966275)
* CVE-2022-27666
- esp: Fix possible buffer overflow in ESP transformation
* CVE-2022-1055
- net: sched: fix use-after-free in tc_new_tfilter()
* Pick fixup from v5.4.176 upstream stable release to address cert
failure with clock jitter test in NUC7i3DNHE (LP: #1964204)
- Bluetooth: refactor malicious adv data check
-- Khalid Elmously <email address hidden> Tue, 29 Mar 2022 23:19:08 -0400