APPLIED: [SRU Bionic/Focal/Impish] CVE-2022-0435

Stefan Bader stefan.bader at canonical.com
Tue Feb 15 09:57:11 UTC 2022


On 14.02.22 15:25, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> An attacker TIPC message may cause the kernel to panic. Remote code
> execution should be prevented by stack protection mitigations.
> 
> [Backports]
> Upstream stable 5.4.y and 4.15.y were used for the focal and bionic
> backports.
> 
> [Potential regression]
> TIPC users might be affected.
> 
> Jon Maloy (1):
>    tipc: improve size validations for received domain records
> 
>   net/tipc/link.c    | 10 +++++++---
>   net/tipc/monitor.c |  2 ++
>   2 files changed, 9 insertions(+), 3 deletions(-)
> 

Applied to bionic,focal,impish:linux/master-next. Thanks.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20220215/0ecb2805/attachment.sig>


More information about the kernel-team mailing list