ACK: [SRU][Focal/oem-5.14][Jammy/oem-5.17][PATCH 0/1] Fix CVE-2022-4379

Tim Gardner tim.gardner at canonical.com
Fri Feb 3 13:44:06 UTC 2023


On 2/1/23 9:52 AM, Andrei Gherzan wrote:
> [Impact]
> 
> A use-after-free vulnerability was found in __nfs42_ssc_open() in
> fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
> conduct a remote denial.
> 
> [Fix]
> 
> Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.
> 
> Backport was required as 1913cdf56cb5 ("NFSD: Replace boolean fields in
> struct nfsd4_copy") requires adaptations for this patch to match the
> removed struct fields. For the nfsd4_do_async_copy conflict there are
> multiple changes affecting the backport but the code path is simple to
> adapt for handling of the nfsd4_interssc_disconnect call.
> 
> [Potential regression]
> 
> None expected, low.
> 
> [Tests]
> 
> * Build test
> * Runtime test
>    * boot a new Jammy/Focal VM instance
>    * loaded nfsd kernel module
> 
> Dai Ngo (1):
>    NFSD: fix use-after-free in __nfs42_ssc_open()
> 
>   fs/nfsd/nfs4proc.c | 22 ++++++----------------
>   1 file changed, 6 insertions(+), 16 deletions(-)
> 
Acked-by: Tim Gardner <tim.gardner at canonical.com>
-- 
-----------
Tim Gardner
Canonical, Inc




More information about the kernel-team mailing list