Ping. thanks, Sheng On 6/3/2015 10:09 AM, Sheng Yong wrote: > Hi, Greg > > PATCH 1 fixes CVE-2015-3339, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3339 > PATCH 2 fixes CVE-2015-2666, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2666 > PATCH 3 fixes CVE-2014-9710, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9710 > > PATCH 1 and 3 are merged into 3.12-stable, if you would like to cherry > pick them from 3.12-stable, the commits are (both of them can be applied > directly): > > 5176b77f1aacdc560eaeac4685ade444bb814689 fs: take i_mutex during prepare_binprm for set[ug]id executables > c5988181af3b41381c4d20e08ca6852f99f95417 x86/microcode/intel: Guard against stack overflow in the loader > > Thanks, > Sheng > > Sheng Yong (3): > fs: take i_mutex during prepare_binprm for set[ug]id executables > x86/microcode/intel: Guard against stack overflow in the loader > Btrfs: make xattr replace operations atomic > > arch/x86/kernel/microcode_intel_early.c | 2 +- > fs/btrfs/ctree.c | 2 +- > fs/btrfs/ctree.h | 5 + > fs/btrfs/dir-item.c | 10 +- > fs/btrfs/xattr.c | 159 ++++++++++++++++++++------------ > fs/exec.c | 79 +++++++++------- > 6 files changed, 160 insertions(+), 97 deletions(-) > -- To unsubscribe from this list: send the line "unsubscribe stable" in