On 08/06/2016 20:14, Willy Tarreau wrote: > On Wed, Jun 08, 2016 at 08:22:38AM -0700, Greg KH wrote: > >> You can tell them that they are running insecure kernels that are >> trivial to break into, and provide them with the latest kernel release >> to resolve that. > > FWIW I just checked, and since we dropped 2.6.32.y 3 months ago, at least > 2-3 null pointer dereferences affect it, that can be used either just to > crash the system, or even to gain privileges under certain conditions. Would you believe me if I told you that we provide kernel version 3.4.39 because "applying security fixes breaks compatibility with binary kernel modules" ? What's worse, some customers agree with that "logic". Regards. -- To unsubscribe from this list: send the line "unsubscribe stable" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html