ACK/Cmnt: [B/F/J/K][PATCH] CVE-2022-3545
Stefan Bader
stefan.bader at canonical.com
Wed Jan 11 08:34:09 UTC 2023
On 10.01.23 01:29, Yuxuan Luo wrote:
> [Impact]
> Under certain circumstance, the nfp has an use-after-free vulnerability.
>
> [Backport]
> They are all clean cherry-picks.
>
> [Potential Regression]
> Regression is scoped in nfp_cppcore.c
>
> [Test]
> Compile and smoke tested on VM.
>
> Jialiang Wang (1):
> nfp: fix use-after-free in area_cache_get()
>
> drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
Same feedback as from Tim. If the same patch applies everywhere it is just
wasting time to look at multiple submissions which are identical.
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230111/3e140e72/attachment.sig>
More information about the kernel-team
mailing list