APPLIED[J/HWE-5.17]: [UBUNTU oem-5.14, jammy, oem-5.17, kinetic, oem-6.0, unstable 0/2] CVE-2022-4378

Stefan Bader stefan.bader at canonical.com
Wed Dec 14 15:03:21 UTC 2022


On 12.12.22 22:05, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> Unprivileged user could cause stack overflow when writing too many
> whitespaces on a sysctl file. Using user/network namespaces make it possible
> for unprivileged users.
> 
> [Testing]
> A simple script was used to test it. The fix worked on the tested 5.14, 5.15,
> 5.19 and 6.1 kernels.
> 
> [Potential regression]
> Writing to sysctl files may fail or parse incorrectly.
> 
> Linus Torvalds (2):
>    proc: proc_skip_spaces() shouldn't think it is working on C strings
>    proc: avoid integer type confusion in get_proc_long
> 
>   kernel/sysctl.c | 30 +++++++++++++++---------------
>   1 file changed, 15 insertions(+), 15 deletions(-)
> 

Applied to jammy:linux/master-next and jammy:linux-hwe-5.17/hwe-5.17-next. Thanks.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20221214/f6ee8bd1/attachment.sig>


More information about the kernel-team mailing list