We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: jbd2: remove wrong sb->s_sequence check Journal emptiness is not determined by sb->s_sequence == 0 but rather by sb->s_start == 0 (which is set a few lines above). Furthermore 0 is a valid transaction ID so the check can spuriously trigger. Remove the invalid WARN_ON.
Reserved 2025-04-16 | Published 2025-05-09 | Updated 2025-05-09 | Assigner Linuxgit.kernel.org/...c/cf30432f5b3064ff85d85639c2f0106f89c566f6
git.kernel.org/...c/b479839525fe7906966cdc4b5b2afbca048558a1
git.kernel.org/...c/ad926f735b4d4f10768fec7d080cadeb6d075cac
git.kernel.org/...c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77
git.kernel.org/...c/c88f7328bb0fff66520fc9164f02b1d06e083c1b
git.kernel.org/...c/9eaec071f111cd2124ce9a5b93536d3f6837d457
git.kernel.org/...c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0
git.kernel.org/...c/b0cca357f85beb6144ab60c62dcc98508cc044bf
git.kernel.org/...c/e6eff39dd0fe4190c6146069cc16d160e71d1148
Support options