Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754685AbaFXSBl (ORCPT ); Tue, 24 Jun 2014 14:01:41 -0400 Received: from kanga.kvack.org ([205.233.56.17]:35006 "EHLO kanga.kvack.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753998AbaFXSBk (ORCPT ); Tue, 24 Jun 2014 14:01:40 -0400 Date: Tue, 24 Jun 2014 14:01:38 -0400 From: Benjamin LaHaise To: Linus Torvalds , security@kernel.org Cc: linux-aio@kvack.org, linux-kernel@vger.kernel.org, Mateusz Guzik , Petr Matousek , Kent Overstreet , Jeff Moyer , stable@vger.kernel.org Subject: [PATCH 0/2] aio: fixes for kernel memory disclosure in aio read events Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.4.2.2i Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Please pull the following 2 fixes from my aio-fixes git tree at git://git.kvack.org/~bcrl/aio-fixes.git . These fix a kernel memory disclosure issue (arbitrary kmap() & copy_to_user()) revealed in CVE-2014-0206 by changes that were introduced in v3.10. Benjamin LaHaise (2): aio: fix aio request leak when events are reaped by userspace aio: fix kernel memory disclosure in io_getevents() introduced in v3.10 fs/aio.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) -- 1.8.2.1 -- "Thought is the essence of where you are now." -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/