ACK/Cmnt: [B/F/J/K][PATCH] CVE-2022-3545

Stefan Bader stefan.bader at canonical.com
Wed Jan 11 08:34:09 UTC 2023


On 10.01.23 01:29, Yuxuan Luo wrote:
> [Impact]
> Under certain circumstance, the nfp has an use-after-free vulnerability.
> 
> [Backport]
> They are all clean cherry-picks.
> 
> [Potential Regression]
> Regression is scoped in nfp_cppcore.c
> 
> [Test]
> Compile and smoke tested on VM.
> 
> Jialiang Wang (1):
>    nfp: fix use-after-free in area_cache_get()
> 
>   drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c | 3 ++-
>   1 file changed, 2 insertions(+), 1 deletion(-)
> 
Same feedback as from Tim. If the same patch applies everywhere it is just 
wasting time to look at multiple submissions which are identical.

Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230111/3e140e72/attachment.sig>


More information about the kernel-team mailing list