Hi, Greg PATCH 1 fixes CVE-2015-3339, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3339 PATCH 2 fixes CVE-2015-2666, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2666 PATCH 3 fixes CVE-2014-9710, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9710 PATCH 1 and 3 are merged into 3.12-stable, if you would like to cherry pick them from 3.12-stable, the commits are (both of them can be applied directly): 5176b77f1aacdc560eaeac4685ade444bb814689 fs: take i_mutex during prepare_binprm for set[ug]id executables c5988181af3b41381c4d20e08ca6852f99f95417 x86/microcode/intel: Guard against stack overflow in the loader Thanks, Sheng Sheng Yong (3): fs: take i_mutex during prepare_binprm for set[ug]id executables x86/microcode/intel: Guard against stack overflow in the loader Btrfs: make xattr replace operations atomic arch/x86/kernel/microcode_intel_early.c | 2 +- fs/btrfs/ctree.c | 2 +- fs/btrfs/ctree.h | 5 + fs/btrfs/dir-item.c | 10 +- fs/btrfs/xattr.c | 159 ++++++++++++++++++++------------ fs/exec.c | 79 +++++++++------- 6 files changed, 160 insertions(+), 97 deletions(-) -- 1.8.3.4 -- To unsubscribe from this list: send the line "unsubscribe stable" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html