Skipped "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" 
since it is already applied for CVE-2019-3460.
Skipped "Bluetooth: Verify that l2cap_get_conf_opt provides large enough 
buffer" since it is already applied for CVE-2019-3459.
Skipped "sched/fair: Fix new task's load avg removed from source CPU in 
wake_up_new_task()" since it is already applied for bug #1643797.
Skipped "btrfs: raid56: properly unmap parity page in finish_parity_scrub()" 
since it is already applied for bug #1812845.

Skipped several patches for CVE-2017-5753 (already applied):
* "ALSA: rawmidi: Fix potential Spectre v1 vulnerability"
* "ALSA: seq: oss: Fix Spectre v1 vulnerability"


** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5753

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-3459

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-3460

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1826212

Title:
  Xenial update: 4.4.178 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1826212/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to