On Mon, Sep 19, 2022 at 11:21:43AM +0300, Vitaly Chikunov wrote:
On Mon, Jun 27, 2022 at 10:20:41PM -0400, Sasha Levin wrote:
From: Hyunwoo Kim imv4bel@gmail.com
[ Upstream commit a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7 ]
In pxa3xx_gcu_write, a count parameter of type size_t is passed to words of type int. Then, copy_from_user() may cause a heap overflow because it is used as the third argument of copy_from_user().
Why this commit is still not in the stable branches?
Mostly because it's not tagged for stable.
But really, looks like I've missed a batch a few months ago, I can push it for the next release cycle.
Isn't this is the fix for CVE-2022-39842[1]?
How the heck did this thing get a CVE?