From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from szxga03-in.huawei.com ([119.145.14.66]:20827 "EHLO szxga03-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751483AbbFWHPu (ORCPT ); Tue, 23 Jun 2015 03:15:50 -0400 Message-ID: <558906CF.7060100@huawei.com> Date: Tue, 23 Jun 2015 15:12:15 +0800 From: Sheng Yong MIME-Version: 1.0 To: CC: , Subject: Re: [request for 3.10 inclusion][PATCH 0/3] Address 3 CVEs References: <1433297367-122419-1-git-send-email-shengyong1@huawei.com> In-Reply-To: <1433297367-122419-1-git-send-email-shengyong1@huawei.com> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: stable-owner@vger.kernel.org List-ID: Ping. thanks, Sheng On 6/3/2015 10:09 AM, Sheng Yong wrote: > Hi, Greg > > PATCH 1 fixes CVE-2015-3339, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3339 > PATCH 2 fixes CVE-2015-2666, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2666 > PATCH 3 fixes CVE-2014-9710, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9710 > > PATCH 1 and 3 are merged into 3.12-stable, if you would like to cherry > pick them from 3.12-stable, the commits are (both of them can be applied > directly): > > 5176b77f1aacdc560eaeac4685ade444bb814689 fs: take i_mutex during prepare_binprm for set[ug]id executables > c5988181af3b41381c4d20e08ca6852f99f95417 x86/microcode/intel: Guard against stack overflow in the loader > > Thanks, > Sheng > > Sheng Yong (3): > fs: take i_mutex during prepare_binprm for set[ug]id executables > x86/microcode/intel: Guard against stack overflow in the loader > Btrfs: make xattr replace operations atomic > > arch/x86/kernel/microcode_intel_early.c | 2 +- > fs/btrfs/ctree.c | 2 +- > fs/btrfs/ctree.h | 5 + > fs/btrfs/dir-item.c | 10 +- > fs/btrfs/xattr.c | 159 ++++++++++++++++++++------------ > fs/exec.c | 79 +++++++++------- > 6 files changed, 160 insertions(+), 97 deletions(-) > -- To unsubscribe from this list: send the line "unsubscribe stable" in