ACK: [SRU][J/F/B][PATCH 0/1] CVE-2022-3565
Stefan Bader
stefan.bader at canonical.com
Mon Nov 21 10:13:49 UTC 2022
On 16.11.22 21:59, Yuxuan Luo wrote:
> [Impact]
> A vulnerability is found at l1oip: when a timer handler is still running after
> the card is released, a use-after-free occurs.
>
> [Backport]
> It is a clean cherry pick.
>
> [Test]
> Compile tested.
>
> [Potential Regression]
> No potential regression since it only adds a few conditional statement as
> protection.
>
> Duoming Zhou (1):
> mISDN: fix use-after-free bugs in l1oip timer handlers
>
> drivers/isdn/mISDN/l1oip.h | 1 +
> drivers/isdn/mISDN/l1oip_core.c | 13 +++++++------
> 2 files changed, 8 insertions(+), 6 deletions(-)
>
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20221121/66270c92/attachment.sig>
More information about the kernel-team
mailing list