lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 18 Dec 2013 08:41:15 -0500 From: Peter Hurley <peter@...leysoftware.com> To: Henrique de Moraes Holschuh <hmh@....eng.br>, linux-kernel@...r.kernel.org CC: Greg KH <gregkh@...uxfoundation.org> Subject: Re: [PATCH v4] n_tty: Fix buffer overruns with larger-than-4k pastes On 12/18/2013 06:48 AM, Henrique de Moraes Holschuh wrote: > On Mon, 16 Dec 2013, Peter Hurley wrote: >>> Is this a 3.13-final thing, or can it wait for 3.14-rc1? >> >> Definitely not 3.13 at this point -- it should go to -next. > > Please earmark it for stable, if possible. This fixes a rather annoying long > time bug, after all... There is a (unlikely) possibility that this will cause a regression in userspace (because this causes a successful read() to return when it would not have in prior kernels). I'd like to see this survive into 3.14-rc5+ before this goes to 3.12 & 3.13 -stable. This will need multiple, different backports for pre-3.12 kernels, which may not work correctly because pre-3.12 didn't lock out the input processing worker during termios changes. Regards, Peter Hurley -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists