[SRU][T/A][PATCH 0/1] Fix for CVE-2018-1094
Khalid Elmously
khalid.elmously at canonical.com
Fri Jul 6 21:02:56 UTC 2018
The CVE info page states that 2 upstream patches are required to fix this CVE, however I think that's incorrect and I believe only 1 patch is needed for the CVE which is a45403b51582a87872927a3e0fc0a389c26867f1
Also the matrix states that xenial is vulnerable to this CVE, however I don't think that's true either (it already has a45403b51582a87872927a3e0fc0a389c26867f1 ).
Clean cherry-pick for artful and a straight-forward backport for trusty.
Theodore Ts'o (1):
ext4: always initialize the crc32c checksum driver
fs/ext4/super.c | 15 ++++++---------
1 file changed, 6 insertions(+), 9 deletions(-)
--
2.17.1
More information about the kernel-team
mailing list