From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.7 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_PASS,USER_AGENT_MUTT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2F68C43381 for ; Sun, 17 Feb 2019 19:26:13 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id B74AB218A3 for ; Sun, 17 Feb 2019 19:26:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550431573; bh=RmFrRy1ipEzdzdAEsAn+ZdrKtk3pvfTJdmQ1Ly3EHbs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=IL9xTv72X+Mdv/+uyLJwODsCeqcO7SVKznlb3N7crgGL+WRJNTEL4qXVbQGOGE7/I Fpo7AvheApvxPn4v9T89Fo20Bqz5hCwUYLbu4c6A3qUykyRmxnis8lhpOV74/nwH/U b/K2pp1BzL7upyEHIwH2UYB9Pr9hRlr8fsw5ouDY= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726169AbfBQT0N (ORCPT ); Sun, 17 Feb 2019 14:26:13 -0500 Received: from mail.kernel.org ([198.145.29.99]:36924 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725554AbfBQT0N (ORCPT ); Sun, 17 Feb 2019 14:26:13 -0500 Received: from localhost (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 38E56218A1; Sun, 17 Feb 2019 19:26:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550431572; bh=RmFrRy1ipEzdzdAEsAn+ZdrKtk3pvfTJdmQ1Ly3EHbs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=0+rNzC4rgVjOAa4OGma2sG7kcxqmP2yFi/KNuWXk7L5iG6mKI7AUHvkCnzDhzaVQp 3uNQrnOt0+OQpwn5Q8HyxlIEAaMwoY9Dib0MMRCLjACP36IdSejZq/tP2lFCQE4Z3D cbsny7eKY94fCjfrdVB1HXuJHFIYH3UWxsas4Mws= Date: Sun, 17 Feb 2019 14:26:11 -0500 From: Sasha Levin To: Jack Wang Cc: gregkh@linuxfoundation.org, stable@vger.kernel.org Subject: Re: [stable-4.9 && 4.14 0/2] CVE 2018-1000026 fixes Message-ID: <20190217192611.GO10616@sasha-vm> References: <20190214103118.4350-1-jinpuwang@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20190214103118.4350-1-jinpuwang@gmail.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Thu, Feb 14, 2019 at 11:31:16AM +0100, Jack Wang wrote: >Hi Greg, > >This is clean cherry-pick from upstream 4.16 for CVE 2018-1000026 > >Other OS vendors have the fixes in their kernels[1][2], but not yet in upstream >stable tree for 4.9 and 4.14. > >Compile tested with 4.14.93. > >Please consider to include them. Queued for 4.14 and 4.9, thank you. -- Thanks, Sasha