lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <b8b86241-4452-4096-b862-cf3e2fca6b1c@windriver.com>
Date: Fri, 13 Sep 2024 11:22:01 +0800
From: "Yan, Haixiao (CN)" <haixiao.yan.cn@...driver.com>
To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Cc: linux-kernel@...r.kernel.org
Subject: Re: Porting fix for CVE-2024-38545 to linux-5.15.y

Thanks, I will submit the patch to 5.15.

As I am currently using the 5.15.

Thanks,

Haixiao

On 9/12/2024 1:05 PM, Greg Kroah-Hartman wrote:
> CAUTION: This email comes from a non Wind River email account!
> Do not click links or open attachments unless you recognize the sender and know the content is safe.
>
> On Thu, Sep 12, 2024 at 11:33:47AM +0800, Yan, Haixiao (CN) wrote:
>> Hello Greg,
>>
>> Could you help to porting
>>
>> https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=a942ec2745ca864cd8512142100e4027dc306a42
>>
>> to the stable version linux-5.15.y
> Please provide a backported, and tested patch, for that and submit it to
> stable@...r.kernel.org as the documentation states if you wish to have
> it in that kernel version.
>
> And why just 5.15?  Why not older kernels?
>
> thanks,
>
> greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ