Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756603AbcC2Nei (ORCPT ); Tue, 29 Mar 2016 09:34:38 -0400 Received: from wtarreau.pck.nerim.net ([62.212.114.60]:41529 "EHLO 1wt.eu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751539AbcC2Neg (ORCPT ); Tue, 29 Mar 2016 09:34:36 -0400 Date: Tue, 29 Mar 2016 15:34:24 +0200 From: Willy Tarreau To: Jeffrey Vander Stoep Cc: stable@vger.kernel.org, linux-kernel@vger.kernel.org, Greg KH , lizefan@huawei.com Subject: Re: Patch for CVE-2016-0774 missing from stable 3.4 and 3.10 kernels Message-ID: <20160329133424.GA19568@1wt.eu> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 372 Lines: 10 On Mon, Mar 28, 2016 at 04:53:48PM -0700, Jeffrey Vander Stoep wrote: > https://lkml.org/lkml/2016/2/23/812 "pipe: Fix buffer offset after > partially failed read" is missing from the stable 3.4.y and 3.10.y > kernels. It has been included in 3.2.y and 3.14.y. > > I am able to cause a kernel panic without this patch. Greg, don't bother with it, I'll handle it. Willy