From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751013AbcFDLdc (ORCPT ); Sat, 4 Jun 2016 07:33:32 -0400 Received: from wtarreau.pck.nerim.net ([62.212.114.60]:21142 "EHLO 1wt.eu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750822AbcFDLdb (ORCPT ); Sat, 4 Jun 2016 07:33:31 -0400 Date: Sat, 4 Jun 2016 13:33:21 +0200 From: Willy Tarreau To: Jeffrey Vander Stoep Cc: stable@vger.kernel.org, linux-kernel@vger.kernel.org, Greg KH , lizefan@huawei.com Subject: Re: Patch for CVE-2016-0774 missing from stable 3.4 and 3.10 kernels Message-ID: <20160604113321.GA18854@1wt.eu> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.6.0 (2016-04-01) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Mon, Mar 28, 2016 at 04:53:48PM -0700, Jeffrey Vander Stoep wrote: > https://lkml.org/lkml/2016/2/23/812 "pipe: Fix buffer offset after > partially failed read" is missing from the stable 3.4.y and 3.10.y > kernels. It has been included in 3.2.y and 3.14.y. > > I am able to cause a kernel panic without this patch. Just a heads up on this one, it is *not* included in 3.14 as of 3.14.71. It's in 3.2 and 3.4 however. Greg, you can pick commit feae3ca2e5e1a from kernel 3.2, it will apply with an offset. Regards, Willy