Sasha,
On Mon, Sep 19, 2022 at 06:24:42PM -0400, Sasha Levin wrote:
On Mon, Sep 19, 2022 at 11:21:43AM +0300, Vitaly Chikunov wrote:
On Mon, Jun 27, 2022 at 10:20:41PM -0400, Sasha Levin wrote:
From: Hyunwoo Kim imv4bel@gmail.com
[ Upstream commit a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7 ]
In pxa3xx_gcu_write, a count parameter of type size_t is passed to words of type int. Then, copy_from_user() may cause a heap overflow because it is used as the third argument of copy_from_user().
Why this commit is still not in the stable branches?
Mostly because it's not tagged for stable.
But really, looks like I've missed a batch a few months ago, I can push it for the next release cycle.
Isn't this is the fix for CVE-2022-39842[1]?
How the heck did this thing get a CVE?
More than that, they also assign high severity score to it: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Confidentiality Impact (C) High Integrity Impact (I) High Availability Impact (A) High
Thanks,
-- Thanks, Sasha