From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from out3-smtp.messagingengine.com ([66.111.4.27]:36083 "EHLO out3-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726205AbeJKQpe (ORCPT ); Thu, 11 Oct 2018 12:45:34 -0400 Date: Thu, 11 Oct 2018 11:19:05 +0200 From: Greg KH To: Daniel Rosenberg Cc: stable@vger.kernel.org Subject: Re: [PATCH 0/2] A couple recent ext4 CVE fixes Message-ID: <20181011091905.GB13455@kroah.com> References: <20181006005129.166109-1-drosen@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181006005129.166109-1-drosen@google.com> Sender: stable-owner@vger.kernel.org List-ID: On Fri, Oct 05, 2018 at 05:51:27PM -0700, Daniel Rosenberg wrote: > A couple ext4-related CVE fixes were released to other kernels in > linux-stable, but didn't cleanly apply to 4.4.y. These are adjusted > cherry-picks of Ben Hutching's 3.16.y backports. Now applied, thanks, greg k-h