-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 01/11/2015, 10:12 PM, Ben Hutchings wrote: > These upstream commits: > > commit 946e51f2bf37f1656916eb75bd0742ba33983c28 Author: Al Viro > <viro@xxxxxxxxxxxxxxxxxx> Date: Sun Oct 26 19:19:16 2014 -0400 > > move d_rcu from overlapping d_child to overlapping d_alias > > commit ca5358ef75fc69fee5322a38a340f5739d997c10 Author: Al Viro > <viro@xxxxxxxxxxxxxxxxxx> Date: Sun Oct 26 19:31:10 2014 -0400 > > deal with deadlock in d_walk() > > fix a local denial-of-service vulnerability, designated > CVE-2014-8559. > > So far, they have only been applied in stable versions 3.18.1 and > (with substantial changes) 3.2.66. However, according to > <https://lkml.org/lkml/2014/10/25/179> the bug was introduced by > "fs: dcache avoid starvation in dcache multi-step operations", i.e. > commit 58db63d08679 in 2.6.38-rc1. So all the 3.x branches should > be fixed. I have just applied the two patches to 3.12. I have taken backports from SLE12. thanks, - -- js suse labs -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJUyNLDAAoJEL0lsQQGtHBJG0QP/j9ufOgGcb2DFbaWwBJKNitr WCPptcDI61UJPFSmusGTOUeyN/SCeRbYjMVk5dmTY9sZjwd7cy4pfMhjEXaT2qJG nQ9jNnGeaZOJ5JmBVdewBIL9fzQc9CBSWH46Z3Sf89zPpQeBWQjH/zoGV/oGwWM+ QKfze2gcl1FHscKVXJ/cp6jATPCeTVkg2MGa2rZpdAFhlNun7aRK91d8yD4Fm5Yc 1+HlT/03W8iPIS53oMsgwwWMDSvv5XeS83Je16Fz5yWHkxCKhsf8mIh9sbZzF4Ea Vy8XwceQTKsduUE3LsOZSRy5ei+0Q9Beh1qd21CFIQRaYQv+nj8h9Aapeu+IulT8 zYwttblXn1Vclrens+dAw9ZY5lOLcjjs9oQKJRQxbjOHbcKfQ+Dh1Nc7Uliw3KYI vowaz55jZkA/OBcfEeS3oWoWOyWfikuWiBXEb228MQ3oTuhodp5eCQDvLoqdS/Sh t/spXxvimkAGCeLDhARQ2kRVbBWNj2qmLU9cqsWGheOvNrd4WYC9vrl+nVPYu+SV +PC2eBFOtT5U2akcWaf614QFVrgcVtkWvfKuuGkmYk2noca1jMni/6gfbGHQ8Gv6 Jz2Gd+XEmOil4KL6ZSDKR9ViFROxIhxcRBhQe0bzYTuqiByBHvgUAt/rwCz1Qa5h KUUySE2JpoVExZDttrtr =mYxG -----END PGP SIGNATURE----- -- To unsubscribe from this list: send the line "unsubscribe stable" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html