lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200308095310.GA4027283@kroah.com>
Date:   Sun, 8 Mar 2020 10:53:10 +0100
From:   Greg KH <gregkh@...uxfoundation.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     Andrew Morton <akpm@...ux-foundation.org>,
        Arnd Bergmann <arnd@...db.de>, linux-kernel@...r.kernel.org
Subject: [GIT PULL] Char/Misc driver fixes for 5.6-rc5

The following changes since commit f8788d86ab28f61f7b46eb6be375f8a726783636:

  Linux 5.6-rc3 (2020-02-23 16:17:42 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/char-misc.git tags/char-misc-5.6-rc5

for you to fetch changes up to f0fe2c0f050d31babcad7d65f1d550d462a40064:

  binder: prevent UAF for binderfs devices II (2020-03-03 19:58:37 +0100)

----------------------------------------------------------------
Char/Misc fixes for 5.6-rc5

Here are 4 small char/misc driver fixes for reported issues for 5.6-rc5.

These fixes are:
	- binder fix for a potential use-after-free problem found (took
	  2 tries to get it right)
	- interconnect core fix
	- altera-stapl driver fix

All 4 of these have been in linux-next for a while with no reported
issues.

Signed-off-by: Greg Kroah-Hartman <gregkh@...uxfoundation.org>

----------------------------------------------------------------
Christian Brauner (2):
      binder: prevent UAF for binderfs devices
      binder: prevent UAF for binderfs devices II

Daniel Axtens (1):
      altera-stapl: altera_get_note: prevent write beyond end of 'key'

Georgi Djakov (1):
      interconnect: Handle memory allocation errors

 drivers/android/binder.c           |  9 +++++++++
 drivers/android/binder_internal.h  |  2 ++
 drivers/android/binderfs.c         |  7 +++++--
 drivers/interconnect/core.c        |  9 +++++++++
 drivers/misc/altera-stapl/altera.c | 12 ++++++------
 5 files changed, 31 insertions(+), 8 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ