lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200110210906.GA1871197@kroah.com>
Date:   Fri, 10 Jan 2020 22:09:06 +0100
From:   Greg KH <gregkh@...uxfoundation.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     Andrew Morton <akpm@...ux-foundation.org>,
        Arnd Bergmann <arnd@...db.de>, linux-kernel@...r.kernel.org
Subject: [GIT PULL] Char/Misc driver fixes for 5.5-rc6

The following changes since commit c79f46a282390e0f5b306007bf7b11a46d529538:

  Linux 5.5-rc5 (2020-01-05 14:23:27 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/char-misc.git tags/char-misc-5.5-rc6

for you to fetch changes up to 68faa679b8be1a74e6663c21c3a9d25d32f1c079:

  chardev: Avoid potential use-after-free in 'chrdev_open()' (2020-01-06 20:10:26 +0100)

----------------------------------------------------------------
Char/Misc patch for 5.5-rc6

Here is a single fix, for the chrdev core, for 5.5-rc6

There's been a long-standing race condition triggered by syzbot, and
occasionally real people, in the chrdev open() path.  Will finally took
the time to track it down and fix it for real before the holidays.

Here's that one patch, it's been in linux-next for a while with no
reported issues and it does fix the reported problem.

Signed-off-by: Greg Kroah-Hartman <gregkh@...uxfoundation.org>

----------------------------------------------------------------
Will Deacon (1):
      chardev: Avoid potential use-after-free in 'chrdev_open()'

 fs/char_dev.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ