From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linuxfoundation.org ([140.211.169.12]:49008 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751086AbdKPLex (ORCPT ); Thu, 16 Nov 2017 06:34:53 -0500 Date: Thu, 16 Nov 2017 12:34:58 +0100 From: Greg Kroah-Hartman To: Ben Hutchings Cc: stable Subject: Re: Security fixes for 4.4 Message-ID: <20171116113458.GE23318@kroah.com> References: <1510780246.18523.74.camel@codethink.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1510780246.18523.74.camel@codethink.co.uk> Sender: stable-owner@vger.kernel.org List-ID: On Wed, Nov 15, 2017 at 09:10:46PM +0000, Ben Hutchings wrote: > Please apply the attached backported patches to 4.4-stable. The > upstream commits are: > > df80cd9b28b9 sctp: do not peel off an assoc from one netns to another one > 2cb80187ba06 net: cdc_ether: fix divide by 0 on bad descriptors > 7fd078337201 net: qmi_wwan: fix divide by 0 on bad descriptors > > The last three are not in later stable branches yet. The USB net > driver fixes are already in David Miller's queue for stable, and i have > asked him to add the sctp fix. I'll wait for these to come in through David's patch submission. thanks, greg k-h