On Fri, Sep 27, 2013 at 10:50:16AM +0200, Jiri Slaby wrote:
> Hi,
> 
> there two vulnerabilities triggerable by an ordinary user fixed by the
> two commits below. The first one applies only to kernels < 3.4. The
> latter < 3.5.
> 
> commit 46a7c17d26967922092f3a8291815ffb20f6cabe
> Author: Sasha Levin <[email protected]>
> Date:   Wed Jan 25 22:16:16 2012 -0500
> 
>     [SCSI] iscsi: don't hang in endless loop if no targets present
> 

Applied to 3.0, thanks.

> commit 047fe3605235888f3ebcda0c728cb31937eadfe6
> Author: Eric Dumazet <[email protected]>
> Date:   Tue Jun 12 15:24:40 2012 +0200
> 
>     splice: fix racy pipe->buffers uses

This is already in 3.4-stable.

> I'm attaching a backport for the latter to 3.0 as it does not apply
> cleanly and needs one more hunk in net/core/skbuff.c.

The backport doesn't apply cleanly at all:
        checking file fs/splice.c
        checking file include/linux/splice.h
        Hunk #2 FAILED at 86.
        1 out of 2 hunks FAILED
        checking file kernel/relay.c
        checking file kernel/trace/trace.c
        checking file mm/shmem.c
        Hunk #1 FAILED at 1861.
        Hunk #2 FAILED at 1949.
        2 out of 2 hunks FAILED
        checking file net/core/skbuff.c

Care to send a version that does apply?

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to