lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <fac697e2-22aa-40e5-942a-a6e40efee0b2@proxmox.com>
Date: Thu, 7 Nov 2024 12:51:14 +0100
From: Christian Ebner <c.ebner@...xmox.com>
To: Greg KH <gregkh@...uxfoundation.org>
Cc: dhowells@...hat.com, jlayton@...nel.org, stable@...r.kernel.org,
 netfs@...ts.linux.dev, linux-fsdevel@...r.kernel.org,
 linux-kernel@...r.kernel.org
Subject: Re: [PATCH stable 6.11.y] netfs: reset subreq->iov_iter before
 netfs_clear_unread() tail clean

On 11/6/24 09:35, Greg KH wrote:
> On Wed, Nov 06, 2024 at 09:26:46AM +0100, Christian Ebner wrote:
> 
> Please try testing the original fixes and providing them as a patch
> series and send them for us to review.
> 
> thanks,
> 
> greg k-h

Hi Greg,

as mentioned, the original series does not apply on stable-6.11.y and 
securely and correctly back-porting this is out of scope for us, given 
resource and time constraints.

The main intend was to contribute back a patch which is also 
back-portable to older kernels. This seems unfeasible with the huge 
original patch series. The submitted patch has successfully been tested 
on our side and fixes the issue for affected customers which were 
willing to test the patch.

Thanks for your time.

Best regards,
Christian Ebner






Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ