From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751058AbcFDTjh (ORCPT ); Sat, 4 Jun 2016 15:39:37 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:33629 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750876AbcFDTjf (ORCPT ); Sat, 4 Jun 2016 15:39:35 -0400 Date: Sat, 4 Jun 2016 12:39:34 -0700 From: Greg KH To: Willy Tarreau Cc: Jeffrey Vander Stoep , stable@vger.kernel.org, linux-kernel@vger.kernel.org, lizefan@huawei.com Subject: Re: Patch for CVE-2016-0774 missing from stable 3.4 and 3.10 kernels Message-ID: <20160604193934.GB9542@kroah.com> References: <20160604113321.GA18854@1wt.eu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20160604113321.GA18854@1wt.eu> User-Agent: Mutt/1.6.1 (2016-04-27) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jun 04, 2016 at 01:33:21PM +0200, Willy Tarreau wrote: > Hi, > > On Mon, Mar 28, 2016 at 04:53:48PM -0700, Jeffrey Vander Stoep wrote: > > https://lkml.org/lkml/2016/2/23/812 "pipe: Fix buffer offset after > > partially failed read" is missing from the stable 3.4.y and 3.10.y > > kernels. It has been included in 3.2.y and 3.14.y. > > > > I am able to cause a kernel panic without this patch. > > Just a heads up on this one, it is *not* included in 3.14 as of 3.14.71. > It's in 3.2 and 3.4 however. Greg, you can pick commit feae3ca2e5e1a > from kernel 3.2, it will apply with an offset. Ugh, sorry about that, I thought I picked it up, my fault. thanks for pointing it out, now queued up. greg k-h