Skipped "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" since it is already applied for CVE-2019-3460. Skipped "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" since it is already applied for CVE-2019-3459. Skipped "sched/fair: Fix new task's load avg removed from source CPU in wake_up_new_task()" since it is already applied for bug #1643797. Skipped "btrfs: raid56: properly unmap parity page in finish_parity_scrub()" since it is already applied for bug #1812845.
Skipped several patches for CVE-2017-5753 (already applied): * "ALSA: rawmidi: Fix potential Spectre v1 vulnerability" * "ALSA: seq: oss: Fix Spectre v1 vulnerability" ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5753 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-3459 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-3460 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1826212 Title: Xenial update: 4.4.178 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Confirmed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.178 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1826212/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp