APPLIED: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3621
Stefan Bader
stefan.bader at canonical.com
Fri Nov 18 10:28:33 UTC 2022
- Previous message (by thread): ACK: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3621
- Next message (by thread): APPLIED [OEM-5.14] Re: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3621
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
On 17.11.22 03:55, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> A corrupted inode on nilfs2 might lead to a NULL pointer dereference.
>
> [Backport]
> A clean cherry-pick applied just fine on all versions.
>
> [Potential regression]
> Using/mounting NILFS2 filesystems might fail.
>
> Ryusuke Konishi (1):
> nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
>
> fs/nilfs2/inode.c | 2 ++
> 1 file changed, 2 insertions(+)
>
Applied to all but OEM-5.14. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20221118/38d8bee3/attachment.sig>
- Previous message (by thread): ACK: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3621
- Next message (by thread): APPLIED [OEM-5.14] Re: [SRU K,HWE-5.17,J,OEM-5.14,F,B 0/1] CVE-2022-3621
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the kernel-team
mailing list