From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.3 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B6E3AC433FF for ; Fri, 2 Aug 2019 07:13:45 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 886FA2087C for ; Fri, 2 Aug 2019 07:13:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564730025; bh=KGkwURT6oROtbyiV837UaNWQF3IWYfVz9XdPgpPgzEM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=kGT099sMkgSXYpZbgn4V10MHtcLZ0csHuWZPkqxJ86kcgZ6SdaayZEwmp7b9ePebu m+4COYNvBm+m9XQyOq+hUzxPn/puNKRkWkBJ4FPsAtTMHhvTYicqy9hDHWVGRKNiZn 917rBHwRhEB5jZoPJL00aLcHKuo6NwMCK5WDzROA= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389225AbfHBHNp (ORCPT ); Fri, 2 Aug 2019 03:13:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:38286 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387657AbfHBHNp (ORCPT ); Fri, 2 Aug 2019 03:13:45 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 228FD20449; Fri, 2 Aug 2019 07:13:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564730024; bh=KGkwURT6oROtbyiV837UaNWQF3IWYfVz9XdPgpPgzEM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=YqqUGxi7fsYUD5QgGW2gMv2RZjaEpjPx024D31ePGhHkifyIi5chsc1cB7MaYxtT7 e729SxD8WogSfLdHTDmR/gwEibHgRFSoS1aoIqbd68sxuv4vAOkYpsWhrbwo/+4BOS onGvkVvPNqpwO69DWFfrqa1oRSNZ7v6PeLI4nP/Y= Date: Fri, 2 Aug 2019 09:13:42 +0200 From: Greg Kroah-Hartman To: Nikola Ciprich Cc: Jinpu Wang , Sasha Levin , "v3.14+, only the raid10 part" Subject: Re: [stable-4.19 0/4] CVE-2019-3900 fixes Message-ID: <20190802071342.GA25871@kroah.com> References: <20190722130313.18562-1-jinpuwang@gmail.com> <20190722154239.GH1607@sasha-vm> <20190802070201.GA18798@pcnci.linuxbox.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190802070201.GA18798@pcnci.linuxbox.cz> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org A: No. Q: Should I include quotations after my reply? http://daringfireball.net/2007/07/on_top On Fri, Aug 02, 2019 at 09:02:01AM +0200, Nikola Ciprich wrote: > Hi, > > just wanted to ask about the status of those? I'm testing patches on top > of 4.19.60, not sure about how can I test if the problem is fixed, but at > least nothing seems to be broken so far.. We wanted to get some verification that the issues were really fixed by these patches. If no one knows how to test them, then odds are they are not vulnerable, right? :) thanks, greg k-h