ACK: [SRU][Focal/oem-5.14][Jammy/oem-5.17][PATCH 0/1] Fix CVE-2022-4379
Tim Gardner
tim.gardner at canonical.com
Fri Feb 3 13:44:06 UTC 2023
On 2/1/23 9:52 AM, Andrei Gherzan wrote:
> [Impact]
>
> A use-after-free vulnerability was found in __nfs42_ssc_open() in
> fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
> conduct a remote denial.
>
> [Fix]
>
> Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.
>
> Backport was required as 1913cdf56cb5 ("NFSD: Replace boolean fields in
> struct nfsd4_copy") requires adaptations for this patch to match the
> removed struct fields. For the nfsd4_do_async_copy conflict there are
> multiple changes affecting the backport but the code path is simple to
> adapt for handling of the nfsd4_interssc_disconnect call.
>
> [Potential regression]
>
> None expected, low.
>
> [Tests]
>
> * Build test
> * Runtime test
> * boot a new Jammy/Focal VM instance
> * loaded nfsd kernel module
>
> Dai Ngo (1):
> NFSD: fix use-after-free in __nfs42_ssc_open()
>
> fs/nfsd/nfs4proc.c | 22 ++++++----------------
> 1 file changed, 6 insertions(+), 16 deletions(-)
>
Acked-by: Tim Gardner <tim.gardner at canonical.com>
--
-----------
Tim Gardner
Canonical, Inc
More information about the kernel-team
mailing list