Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751876AbcC2I1G (ORCPT ); Tue, 29 Mar 2016 04:27:06 -0400 Received: from szxga02-in.huawei.com ([119.145.14.65]:11164 "EHLO szxga02-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751217AbcC2I1D (ORCPT ); Tue, 29 Mar 2016 04:27:03 -0400 Subject: Re: Patch for CVE-2016-0774 missing from stable 3.4 and 3.10 kernels To: Jeffrey Vander Stoep , References: CC: , Greg KH From: Zefan Li Message-ID: <56FA3C3E.7030807@huawei.com> Date: Tue, 29 Mar 2016 16:26:38 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.177.19.236] X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020205.56FA3C50.0064,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: 23f2524aac1bba2a99f379cca4753629 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 337 Lines: 9 On 2016/3/29 7:53, Jeffrey Vander Stoep wrote: > https://lkml.org/lkml/2016/2/23/812 "pipe: Fix buffer offset after > partially failed read" is missing from the stable 3.4.y and 3.10.y > kernels. It has been included in 3.2.y and 3.14.y. > > I am able to cause a kernel panic without this patch. > I'll queue it up for 3.4.y. Thanks!