Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755535AbcC1Xxv (ORCPT ); Mon, 28 Mar 2016 19:53:51 -0400 Received: from mail-oi0-f47.google.com ([209.85.218.47]:34352 "EHLO mail-oi0-f47.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752222AbcC1Xxu (ORCPT ); Mon, 28 Mar 2016 19:53:50 -0400 MIME-Version: 1.0 Date: Mon, 28 Mar 2016 16:53:48 -0700 Message-ID: Subject: Patch for CVE-2016-0774 missing from stable 3.4 and 3.10 kernels From: Jeffrey Vander Stoep To: stable@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Greg KH , lizefan@huawei.com Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 268 Lines: 8 https://lkml.org/lkml/2016/2/23/812 "pipe: Fix buffer offset after partially failed read" is missing from the stable 3.4.y and 3.10.y kernels. It has been included in 3.2.y and 3.14.y. I am able to cause a kernel panic without this patch. Regards, Jeff Vander Stoep