The following patches were skipped because they have already been
applied:

* mISDN: enforce CAP_NET_RAW for raw sockets
* appletalk: enforce CAP_NET_RAW for raw sockets
* ax25: enforce CAP_NET_RAW for raw sockets
* ieee802154: enforce CAP_NET_RAW for raw sockets

Note: the following patch was applied (after reverting our backport) as
it is now a clean cherry pick.

* mac80211: handle deauthentication/disassociation from TDLS peer

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1848589

Title:
  Xenial update: 4.4.195 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
      SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         4.4.195 upstream stable release
         from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1848589/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to