On Wed, Jun 03, 2015 at 02:09:24AM +0000, Sheng Yong wrote: > Hi, Greg > > PATCH 1 fixes CVE-2015-3339, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3339 > PATCH 2 fixes CVE-2015-2666, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2666 > PATCH 3 fixes CVE-2014-9710, link https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9710 > > PATCH 1 and 3 are merged into 3.12-stable, if you would like to cherry > pick them from 3.12-stable, the commits are (both of them can be applied > directly): > > 5176b77f1aacdc560eaeac4685ade444bb814689 fs: take i_mutex during prepare_binprm for set[ug]id executables > c5988181af3b41381c4d20e08ca6852f99f95417 x86/microcode/intel: Guard against stack overflow in the loader All 3 now applied, thanks. greg k-h -- To unsubscribe from this list: send the line "unsubscribe stable" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html