Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp4854466rwb; Tue, 20 Sep 2022 22:36:38 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5YXseeT1HfDpcsg72MMRbhhUsfwrjRewxxM6M+DkCKGMFFSC3EkBCZxhZM5aBfHdNvskEL X-Received: by 2002:a17:907:9490:b0:781:c079:1294 with SMTP id dm16-20020a170907949000b00781c0791294mr5432579ejc.29.1663738598386; Tue, 20 Sep 2022 22:36:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663738598; cv=none; d=google.com; s=arc-20160816; b=dI1bgFYeYbtX642mu4u72l9g8rYXrnWs+fCDW1m4qdyHAB/uYUbRTt0cVo+v8q4kyB DwemCCZPQIrCiSpnZ85OLyNauxol6EuXkXHXeaZHG9JvQ5esp++iu4y40DLDNwI9g469 oRyNfoVtZBIkE3Wl3jG+c+S5+VmkF2mTP/zazBXLUmIL6TYZoAGbBtuCfOPx1x+s5VD2 YONrqlnpH0o3vDZhWT/dYkZFcwjttfyWTwubIEgk+YI3eI8BqtZZ1yA9FJcOIa+fI7nB tdRMCISfl3EkqBKFEF2qpwI7ftkD8XAY1cZP/UHua4kRBp60StBgtX4ssVP8/0rhQlsM BWAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=1HNj9N5gD5Npl/R8A1RFG98lIb2YizBd4Z/1GRbtbng=; b=Kcm3MXCJfjKEgIwVDF1VceIoF8pftfw3gP2UxtQbvQuuol904YWkp/Ojrruz3cjoAd G0SPsyIr/ptjRtexaVetRK3PTAIFswKcKMDpM9CY27cuatNlZUGJtcYk8qJEjo2k9fOi jpXWPMxM+1g1L65MiuoOc5qSJEHAeqLRKs/yr/TMj4Fz1JW5iwvQr+Nm4y2TL5cLWzQp aO/vWMTkWh4jJ1Ig5bgSeAGeEERhVKpRalOE9FCiV2S0Usz49aQd4Sq4jOHwliwFDTtp 3E1Q+b4J4Jm09GFnF02XAYJcCh215wjSQnHKA+1LP/CjkYqX9uDJn3T4dOXkaWfR5ZAM 8prQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a3-20020a50e703000000b0043d7a3c3cddsi1409618edn.408.2022.09.20.22.36.07; Tue, 20 Sep 2022 22:36:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230054AbiIUFKu (ORCPT + 99 others); Wed, 21 Sep 2022 01:10:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46522 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229522AbiIUFKr (ORCPT ); Wed, 21 Sep 2022 01:10:47 -0400 Received: from vmicros1.altlinux.org (vmicros1.altlinux.org [194.107.17.57]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B833A78BC6; Tue, 20 Sep 2022 22:10:46 -0700 (PDT) Received: from imap.altlinux.org (imap.altlinux.org [194.107.17.38]) by vmicros1.altlinux.org (Postfix) with ESMTP id 544DC72C90B; Wed, 21 Sep 2022 08:10:45 +0300 (MSK) Received: from altlinux.org (sole.flsd.net [185.75.180.6]) by imap.altlinux.org (Postfix) with ESMTPSA id 3EC6D4A4826; Wed, 21 Sep 2022 08:10:45 +0300 (MSK) Date: Wed, 21 Sep 2022 08:10:45 +0300 From: Vitaly Chikunov To: Sasha Levin Cc: Greg Kroah-Hartman , linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH AUTOSEL 5.15 22/41] video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write Message-ID: <20220921051045.dqnivsbrigwqlkan@altlinux.org> References: <20220628022100.595243-1-sashal@kernel.org> <20220628022100.595243-22-sashal@kernel.org> <20220919082143.g4gn5ssbzolnc57b@altlinux.org> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Sasha, On Mon, Sep 19, 2022 at 06:24:42PM -0400, Sasha Levin wrote: > On Mon, Sep 19, 2022 at 11:21:43AM +0300, Vitaly Chikunov wrote: > > On Mon, Jun 27, 2022 at 10:20:41PM -0400, Sasha Levin wrote: > > > From: Hyunwoo Kim > > > > > > [ Upstream commit a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7 ] > > > > > > In pxa3xx_gcu_write, a count parameter of type size_t is passed to words of > > > type int. Then, copy_from_user() may cause a heap overflow because it is used > > > as the third argument of copy_from_user(). > > > > Why this commit is still not in the stable branches? > > Mostly because it's not tagged for stable. > > But really, looks like I've missed a batch a few months ago, I can push > it for the next release cycle. > > > Isn't this is the fix for CVE-2022-39842[1]? > > How the heck did this thing get a CVE? More than that, they also assign high severity score to it: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Confidentiality Impact (C) High Integrity Impact (I) High Availability Impact (A) High Thanks, > > -- > Thanks, > Sasha