[SRU][T/A][PATCH 0/1] Fix for CVE-2018-1094

Khalid Elmously khalid.elmously at canonical.com
Fri Jul 6 21:02:56 UTC 2018


The CVE info page states that 2 upstream patches are required to fix this CVE, however I think that's incorrect and I believe only 1 patch is needed for the CVE which is a45403b51582a87872927a3e0fc0a389c26867f1

Also the matrix states that xenial is vulnerable to this CVE, however I don't think that's true either (it already has a45403b51582a87872927a3e0fc0a389c26867f1 ).

Clean cherry-pick for artful and a straight-forward backport for trusty.


Theodore Ts'o (1):
  ext4: always initialize the crc32c checksum driver

 fs/ext4/super.c | 15 ++++++---------
 1 file changed, 6 insertions(+), 9 deletions(-)

-- 
2.17.1





More information about the kernel-team mailing list