From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linuxfoundation.org ([140.211.169.12]:32892 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1759533AbdKPN2S (ORCPT ); Thu, 16 Nov 2017 08:28:18 -0500 Date: Thu, 16 Nov 2017 14:28:23 +0100 From: Greg Kroah-Hartman To: Paolo Bonzini Cc: Ben Hutchings , Andy Lutomirski , Radim =?utf-8?B?S3LEjW3DocWZ?= , stable Subject: Re: Security fixes for 4.4 Message-ID: <20171116132823.GA9921@kroah.com> References: <1510780246.18523.74.camel@codethink.co.uk> <20171116113116.GB23318@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: stable-owner@vger.kernel.org List-ID: On Thu, Nov 16, 2017 at 12:32:50PM +0100, Paolo Bonzini wrote: > On 16/11/2017 12:31, Greg Kroah-Hartman wrote: > > On Wed, Nov 15, 2017 at 09:10:46PM +0000, Ben Hutchings wrote: > >> Please apply the attached backported patches to 4.4-stable. The > >> upstream commits are: > >> > >> c8401dda2f0a KVM: x86: fix singlestepping over syscall > > > > Does not apply to 4.4-stable, are you sure it is needed? If so, anyone > > know where I can get a backported version? :) > > I'll send one. Wonderful!