Skipped: - xfs: don't call xfs_da_shrink_inode with NULL bp (applied already for CVE-2018-13094) - net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe() (fixed already for CVE-2018-8043)
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-13094 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8043 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1892822 Title: Xenial update: 4.4.233 upstream stable release Status in linux package in Ubuntu: Confirmed Status in linux source package in Xenial: New Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.233 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp

