Sasha, On Mon, Sep 19, 2022 at 06:24:42PM -0400, Sasha Levin wrote: > On Mon, Sep 19, 2022 at 11:21:43AM +0300, Vitaly Chikunov wrote: > > On Mon, Jun 27, 2022 at 10:20:41PM -0400, Sasha Levin wrote: > > > From: Hyunwoo Kim <imv4bel@xxxxxxxxx> > > > > > > [ Upstream commit a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7 ] > > > > > > In pxa3xx_gcu_write, a count parameter of type size_t is passed to words of > > > type int. Then, copy_from_user() may cause a heap overflow because it is used > > > as the third argument of copy_from_user(). > > > > Why this commit is still not in the stable branches? > > Mostly because it's not tagged for stable. > > But really, looks like I've missed a batch a few months ago, I can push > it for the next release cycle. > > > Isn't this is the fix for CVE-2022-39842[1]? > > How the heck did this thing get a CVE? More than that, they also assign high severity score to it: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Confidentiality Impact (C) High Integrity Impact (I) High Availability Impact (A) High Thanks, > > -- > Thanks, > Sasha