From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linuxfoundation.org ([140.211.169.12]:41010 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750807AbdKSKSG (ORCPT ); Sun, 19 Nov 2017 05:18:06 -0500 Date: Sun, 19 Nov 2017 11:18:10 +0100 From: Greg Kroah-Hartman To: Ben Hutchings Cc: stable Subject: Re: Security fixes for 4.4 Message-ID: <20171119101810.GA11609@kroah.com> References: <1510780246.18523.74.camel@codethink.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1510780246.18523.74.camel@codethink.co.uk> Sender: stable-owner@vger.kernel.org List-ID: On Wed, Nov 15, 2017 at 09:10:46PM +0000, Ben Hutchings wrote: > Please apply the attached backported patches to 4.4-stable. The > upstream commits are: > > 06bd3c36a733 ext4: fix data exposure after a crash > c8401dda2f0a KVM: x86: fix singlestepping over syscall > 0d0e57697f16 bpf: don't let ldimm64 leak map addresses on unprivileged > 089bc0143f48 xen-blkback: don't leak stack data via response ring > df80cd9b28b9 sctp: do not peel off an assoc from one netns to another one > 2cb80187ba06 net: cdc_ether: fix divide by 0 on bad descriptors > 7fd078337201 net: qmi_wwan: fix divide by 0 on bad descriptors > > The last three are not in later stable branches yet. The USB net > driver fixes are already in David Miller's queue for stable, and i have > asked him to add the sctp fix. All now applied, thanks. greg k-h