Another Linux Kernel vuln with no CVE: “…can lead to a negative value
that will later be passed to access_remote_vm(), which can cause unexpected behavior.” In my culture we call that a buffer overflow
https://lore.kernel.org/patchwork/patch/1467962/…
i love scrolling through the commit history for, like, the android binder driver and seeing casual UAF or race condition fixes. and then thinking about how android devices don't get kernel patches backported without a CVE 🥲
Android common kernel and GKIs quickly ship the http://kernel.org LTS branches. It takes them a few months to ship them for non-GKI kernels.
The bare minimum required by the monthly security bulletins is much narrower but they do reference the LTS kernel releases now.
It's not yet mandatory to promptly ship the LTS kernel releases in order to declare the latest monthly security update. It's likely going to become mandatory to not have so much delay for future releases. Not yet clear what will be required for devices launched with Android 12.
The security bulletins are a list of known security issues which are mandatory to fix. It's intended to be very easy to apply the fixes. It's anything but easy to ship http://kernel.org LTS tags right now. There are a massive number of fixes with frequent regressions now.
The other side to the http://kernel.org LTS branches having drastically more fixes than ever before is that it's increasingly hard to integrate/ship them when there are a lot of out-of-tree drivers, even if those drivers eventually got landed upstream for future branches.