The following patches were skipped:
* bug #1705447 misleading kernel warning skb_warn_bad_offload during
  checksum calculation
  - net: reduce skb_warn_bad_offload() noise
* bug #1682871 "attempts to rename vlans / vlans have addr_assign_type
  of 0 on kernel 4.4
  - vlan: Propagate MAC address to VLANs
* CVE-2017-7533
  - dentry name snapshots
  - /proc/iomem: only expose physical resource addresses to privileged
    users
* CVE-2017-1000112
  - ipv6: Should use consistent conditional judgement for ip6 fragment
    between __ip6_append_data and ip6_finish_output

For "mpt3sas: Don't overreach ioc->reply_post[] during initialization",
hunk #1 had to be modified to apply.

For "tpm: Replace device number bitmap with IDR" hunk #4 of
drivers/char/tpm/tpm-chip.c had to be ignored.

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000112

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7533

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1710646

Title:
  Xenial update to 4.4.80 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1710646/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to