The following patches were skipped:
* bug #1705447 misleading kernel warning skb_warn_bad_offload during
checksum calculation
- net: reduce skb_warn_bad_offload() noise
* bug #1682871 "attempts to rename vlans / vlans have addr_assign_type
of 0 on kernel 4.4
- vlan: Propagate MAC address to VLANs
* CVE-2017-7533
- dentry name snapshots
- /proc/iomem: only expose physical resource addresses to privileged
users
* CVE-2017-1000112
- ipv6: Should use consistent conditional judgement for ip6 fragment
between __ip6_append_data and ip6_finish_output
For "mpt3sas: Don't overreach ioc->reply_post[] during initialization",
hunk #1 had to be modified to apply.
For "tpm: Replace device number bitmap with IDR" hunk #4 of
drivers/char/tpm/tpm-chip.c had to be ignored.
** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000112
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7533
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1710646
Title:
Xenial update to 4.4.80 stable release
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1710646/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs