NACK/Cmnt: [SRU][J/F/B] CVE-2022-3649
Stefan Bader
stefan.bader at canonical.com
Mon Nov 14 09:17:29 UTC 2022
On 11.11.22 19:56, Yuxuan Luo wrote:
> [Impact]
> If the disk is already corrupted while the user is using NILFS, there exists
> a situation that the file system would erroneously operate and crush.
>
> [Backport]
> The patch d325dc6eb763c10f591c239550b8c7e5466a5d09 can be cherry-picked to Jammy
> cleanly. In addition to this, Focal and Bionic needs to cherry-pick commit
> a1d0747a393a079631130d61faa2a61027d1c789 to use macro nilfs_warn and nilfs_info.
>
> [Testing]
> Compile tested.
>
> [Potential Regression]
> This patch does not alter any existing logic but add a handler for a rare
> situation; therefore, there is no potential regression.
>
> Ryusuke Konishi (1):
> nilfs2: fix use-after-free bug of struct nilfs_root
>
> fs/nilfs2/inode.c | 17 ++++++++++++++++-
> fs/nilfs2/nilfs.h | 5 +++++
> 2 files changed, 21 insertions(+), 1 deletion(-)
>
Oh, looks like this is the rest of the submission I just acked. I wonder what
mailer is being used. Using gmail appears to be a big issue. For sending and for
viewing as well. For some reason they cannot get threads right.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20221114/a771d5db/attachment.sig>
More information about the kernel-team
mailing list