Message ID | 20220214142516.237481-1-cascardo@canonical.com |
---|---|
Headers | show |
Series | CVE-2022-0435 | expand |
Acked-by: Tim Gardner <tim.gardner@canonical.com> On 2/14/22 7:25 AM, Thadeu Lima de Souza Cascardo wrote: > [Impact] > An attacker TIPC message may cause the kernel to panic. Remote code > execution should be prevented by stack protection mitigations. > > [Backports] > Upstream stable 5.4.y and 4.15.y were used for the focal and bionic > backports. > > [Potential regression] > TIPC users might be affected. > > Jon Maloy (1): > tipc: improve size validations for received domain records > > net/tipc/link.c | 10 +++++++--- > net/tipc/monitor.c | 2 ++ > 2 files changed, 9 insertions(+), 3 deletions(-) >
On 14.02.22 15:25, Thadeu Lima de Souza Cascardo wrote: > [Impact] > An attacker TIPC message may cause the kernel to panic. Remote code > execution should be prevented by stack protection mitigations. > > [Backports] > Upstream stable 5.4.y and 4.15.y were used for the focal and bionic > backports. > > [Potential regression] > TIPC users might be affected. > > Jon Maloy (1): > tipc: improve size validations for received domain records > > net/tipc/link.c | 10 +++++++--- > net/tipc/monitor.c | 2 ++ > 2 files changed, 9 insertions(+), 3 deletions(-) > Acked-by: Stefan Bader <stefan.bader@canonical.com>
On 14.02.22 15:25, Thadeu Lima de Souza Cascardo wrote: > [Impact] > An attacker TIPC message may cause the kernel to panic. Remote code > execution should be prevented by stack protection mitigations. > > [Backports] > Upstream stable 5.4.y and 4.15.y were used for the focal and bionic > backports. > > [Potential regression] > TIPC users might be affected. > > Jon Maloy (1): > tipc: improve size validations for received domain records > > net/tipc/link.c | 10 +++++++--- > net/tipc/monitor.c | 2 ++ > 2 files changed, 9 insertions(+), 3 deletions(-) > Applied to bionic,focal,impish:linux/master-next. Thanks. -Stefan
On Mon, Feb 14, 2022 at 11:25:13AM -0300, Thadeu Lima de Souza Cascardo wrote: > [Impact] > An attacker TIPC message may cause the kernel to panic. Remote code > execution should be prevented by stack protection mitigations. > > [Backports] > Upstream stable 5.4.y and 4.15.y were used for the focal and bionic > backports. > > [Potential regression] > TIPC users might be affected. Applied to jammy/linux. Thanks, -Andrea
Thadeu Lima de Souza Cascardo kirjoitti 14.2.2022 klo 16.25: > [Impact] > An attacker TIPC message may cause the kernel to panic. Remote code > execution should be prevented by stack protection mitigations. > > [Backports] > Upstream stable 5.4.y and 4.15.y were used for the focal and bionic > backports. > > [Potential regression] > TIPC users might be affected. > > Jon Maloy (1): > tipc: improve size validations for received domain records > > net/tipc/link.c | 10 +++++++--- > net/tipc/monitor.c | 2 ++ > 2 files changed, 9 insertions(+), 3 deletions(-) > applied to oem-5.14, thanks