APPLIED: [B/F/J/K][PATCH] CVE-2022-3545
Stefan Bader
stefan.bader at canonical.com
Fri Jan 13 10:14:58 UTC 2023
On 10.01.23 01:29, Yuxuan Luo wrote:
> [Impact]
> Under certain circumstance, the nfp has an use-after-free vulnerability.
>
> [Backport]
> They are all clean cherry-picks.
>
> [Potential Regression]
> Regression is scoped in nfp_cppcore.c
>
> [Test]
> Compile and smoke tested on VM.
>
> Jialiang Wang (1):
> nfp: fix use-after-free in area_cache_get()
>
> drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
Applied to kinetic,jammy,focal,bionic:linux/master-next. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230113/9b2308e3/attachment.sig>
More information about the kernel-team
mailing list