Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753335AbcLGHfK (ORCPT ); Wed, 7 Dec 2016 02:35:10 -0500 Received: from mail.manjaro.org ([176.9.38.148]:41516 "EHLO manjaro.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752880AbcLGHfH (ORCPT ); Wed, 7 Dec 2016 02:35:07 -0500 To: "Linux-Kernel@Vger. Kernel. Org" From: =?UTF-8?Q?Philip_M=c3=bcller?= Subject: Re: [PATCH 4.4 00/13] 4.4.37-stable review Message-ID: Date: Wed, 7 Dec 2016 08:35:00 +0100 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 464 Lines: 13 Hi Greg, I'd recommend also to queue 84ac726[1] (packet: fix race condition in packet_set_ring) from Philip Pettersson into 4.4 and 4.8 series, as some news pages[2] already post about this local security, which was introduced in 2011 to all kernels. greez, Phil [1] https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c [2] http://phoronix.com/scan.php?page=news_item&px=Linux-Kernel-CVE-2016-8655