NACK/Cmnt: [SRU][J/F/B] CVE-2022-3649

Stefan Bader stefan.bader at canonical.com
Mon Nov 14 09:17:29 UTC 2022


On 11.11.22 19:56, Yuxuan Luo wrote:
> [Impact]
> If the disk is already corrupted while the user is using NILFS, there exists
> a situation that the file system would erroneously operate and crush.
> 
> [Backport]
> The patch d325dc6eb763c10f591c239550b8c7e5466a5d09 can be cherry-picked to Jammy
> cleanly. In addition to this, Focal and Bionic needs to cherry-pick commit
> a1d0747a393a079631130d61faa2a61027d1c789 to use macro nilfs_warn and nilfs_info.
> 
> [Testing]
> Compile tested.
> 
> [Potential Regression]
> This patch does not alter any existing logic but add a handler for a rare
> situation; therefore, there is no potential regression.
> 
> Ryusuke Konishi (1):
>    nilfs2: fix use-after-free bug of struct nilfs_root
> 
>   fs/nilfs2/inode.c | 17 ++++++++++++++++-
>   fs/nilfs2/nilfs.h |  5 +++++
>   2 files changed, 21 insertions(+), 1 deletion(-)
> 

Oh, looks like this is the rest of the submission I just acked. I wonder what 
mailer is being used. Using gmail appears to be a big issue. For sending and for 
viewing as well. For some reason they cannot get threads right.

-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20221114/a771d5db/attachment.sig>


More information about the kernel-team mailing list