From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linuxfoundation.org ([140.211.169.12]:48992 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934049AbdKPLdy (ORCPT ); Thu, 16 Nov 2017 06:33:54 -0500 Date: Thu, 16 Nov 2017 12:33:59 +0100 From: Greg Kroah-Hartman To: Ben Hutchings Cc: stable Subject: Re: Security fixes for 4.4 Message-ID: <20171116113359.GD23318@kroah.com> References: <1510780246.18523.74.camel@codethink.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1510780246.18523.74.camel@codethink.co.uk> Sender: stable-owner@vger.kernel.org List-ID: On Wed, Nov 15, 2017 at 09:10:46PM +0000, Ben Hutchings wrote: > Please apply the attached backported patches to 4.4-stable. The > upstream commits are: > > 089bc0143f48 xen-blkback: don't leak stack data via response ring Does not apply to 4.4-stable at all :(