Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752584AbdLHHhO (ORCPT ); Fri, 8 Dec 2017 02:37:14 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:38872 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751021AbdLHHhN (ORCPT ); Fri, 8 Dec 2017 02:37:13 -0500 Date: Fri, 8 Dec 2017 07:25:42 +0100 From: Greg KH To: Shuah Khan Cc: shuah@kernel.org, valentina.manea.m@gmail.com, linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org, vuln@secunia.com Subject: Re: [PATCH 0/4] USB over IP Secuurity fixes Message-ID: <20171208062542.GA6194@kroah.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.1 (2017-09-22) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 303 Lines: 12 On Thu, Dec 07, 2017 at 02:16:46PM -0700, Shuah Khan wrote: > Jakub Jirasek from Secunia Research at Flexera reported security > vulnerabilities in the USB over IP driver. This patch series all > the 4 reported problems. Nice! These should also all go to the stable kernels, right? thanks, greg k-h