Skipped:
 - xfs: don't call xfs_da_shrink_inode with NULL bp (applied already for 
CVE-2018-13094)
 - net: phy: mdio-bcm-unimac: fix potential NULL dereference in 
unimac_mdio_probe() (fixed already for CVE-2018-8043)

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-13094

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8043

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1892822

Title:
  Xenial update: 4.4.233 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  
      SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         4.4.233 upstream stable release
         from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to