APPLIED Re: [SRU][Focal/oem-5.14][Jammy/oem-5.17][PATCH 0/1] Fix CVE-2022-4379
Timo Aaltonen
tjaalton at ubuntu.com
Tue Feb 7 14:14:09 UTC 2023
Andrei Gherzan kirjoitti 1.2.2023 klo 18.52:
> [Impact]
>
> A use-after-free vulnerability was found in __nfs42_ssc_open() in
> fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
> conduct a remote denial.
>
> [Fix]
>
> Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.
>
> Backport was required as 1913cdf56cb5 ("NFSD: Replace boolean fields in
> struct nfsd4_copy") requires adaptations for this patch to match the
> removed struct fields. For the nfsd4_do_async_copy conflict there are
> multiple changes affecting the backport but the code path is simple to
> adapt for handling of the nfsd4_interssc_disconnect call.
>
> [Potential regression]
>
> None expected, low.
>
> [Tests]
>
> * Build test
> * Runtime test
> * boot a new Jammy/Focal VM instance
> * loaded nfsd kernel module
>
> Dai Ngo (1):
> NFSD: fix use-after-free in __nfs42_ssc_open()
>
> fs/nfsd/nfs4proc.c | 22 ++++++----------------
> 1 file changed, 6 insertions(+), 16 deletions(-)
>
applied to both, thanks
--
t
More information about the kernel-team
mailing list