Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp12924573rwl; Wed, 4 Jan 2023 00:30:58 -0800 (PST) X-Google-Smtp-Source: AMrXdXt1WxUl2WcJtox2l73Iw2JPxanYjkOqZW8C9m+zW/PjCY5l/JRHkk1wuDkc8jrBT3slLmnQ X-Received: by 2002:a17:903:24b:b0:187:282d:6990 with SMTP id j11-20020a170903024b00b00187282d6990mr36600735plh.28.1672821058153; Wed, 04 Jan 2023 00:30:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672821058; cv=none; d=google.com; s=arc-20160816; b=DRHnj8B3BPBj7FcZBR/EX4lbh1Cc+pGmPImS1sSR851K+1XfVxFEdbP/+RYSYGm5d/ 0b1VLg0HNeHT7xkKdbt4bO9Hzthdeo538wLYsYyvLcgJqbfEyG1y8kwmq0AiKzeti/s/ ImAedNoKONUYoVgjxSJetb96yStqp+bHoPgfWa3kx+KOe2FKZiGU6UeEIH6yPcS2MiSQ WbSPcT2cWr268F7v08e16uzh3z7gX/ydYzRx5I+MR6fx/IJx4YrPesLoCnkttDwzLXhY kjkhc2BgDMX110JWF7MqnnbavihFPL2oMMr6nqNSF2mTAFUxlJlkp6t0l4gogu/CYuBa 93Xw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=C6c4LsD7TLeUtSYw1bVulmORV1KlKTRlk8t80g2IQhc=; b=xdh3j1nDel7uV0vZRJ+qMjYk+o4LkIg/gzCcpPJGj9AeErxJUQQodjA07mlo895D8h K9cLwUucOiemVlZkPWfHEF5RwwhiiHqnPcJLX6QO5RPZqnr8CP0Cca3ikyHzsWeDzcPK 4C/uRlIZpbMhTluwWBAj0KNlwCQXdW29adiw9IRzVq9hTFRdjjX4IxvwPaKvmZbkMMVE mSE8MEanJOn66libuiqUyCTn/gtO1Q6DGYdxfBTvmwbe3R48dlmEtMeEHHG4DJl9V3Kr kYJq1d8eonUOCguVNGTLyoVH+ngQt0jSFrGgQjxRDSjg6Qe2bguxiWqS4dvjMtu3uxLx 4Jdg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=GZOtbdTW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l185-20020a6388c2000000b00478946da909si16278399pgd.31.2023.01.04.00.30.50; Wed, 04 Jan 2023 00:30:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=GZOtbdTW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233357AbjADI0Q (ORCPT + 57 others); Wed, 4 Jan 2023 03:26:16 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57888 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229492AbjADI0P (ORCPT ); Wed, 4 Jan 2023 03:26:15 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B16BE29B; Wed, 4 Jan 2023 00:26:13 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 49EC8615A8; Wed, 4 Jan 2023 08:26:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 416E0C433EF; Wed, 4 Jan 2023 08:26:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1672820772; bh=cQUoRiARdu/+zOek7DKostZX30DSNt2xnSAkBlA+3+o=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=GZOtbdTWj2ISTao9FEwwzOrYZQSuYM6WDPiMerh8GF6dG2/Ezx28MjEdo8OLHxfLO 0RkPuQjBAu4EuuLMO93AP9WCQCCYP5Uyd4dEZ5IKqD0OaziF0hH1qvh9dVnCgM+uMh yhB1J4/5S/DJ6+jthlwC/l+G3CUbMdp6MYVl0l04= Date: Wed, 4 Jan 2023 09:26:09 +0100 From: Greg Kroah-Hartman To: Sven Schnelle Cc: Jiri Slaby , Christian Borntraeger , linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org Subject: Re: [PATCH v2 0/2] fix out-of-bounds access when specifying invalid console Message-ID: References: <20221209112737.3222509-1-svens@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 04, 2023 at 08:20:49AM +0100, Sven Schnelle wrote: > Sven Schnelle writes: > > > Hi, > > > > these two patches fix a crash in the tty driver when a user specifies an > > invalid console like 'console=tty3000'. The first patch adds a check to > > tty_driver_lookup_tty(), the second one prevents that such a console gets > > registered in the vt driver. > > > > Changes in v2: > > - trim commit message in first patch > > - add second patch as suggested by Jiri Slaby > > > > Sven Schnelle (2): > > tty: fix out-of-bounds access in tty_driver_lookup_tty() > > tty/vt: prevent registration of console with invalid number > > > > drivers/tty/tty_io.c | 8 +++++--- > > drivers/tty/vt/vt.c | 6 ++++++ > > 2 files changed, 11 insertions(+), 3 deletions(-) > > Gentle ping... I couldn't find that this was applied anywhere? It's in my to-review queue, which is about 2000+ patches right now, give me some time to dig it out. In the meantime, please feel free to review other pending patches on the list to help out with the workload. thanks, greg k-h