APPLIED Re: [SRU][Focal/oem-5.14][Jammy/oem-5.17][PATCH 0/1] Fix CVE-2022-4379

Timo Aaltonen tjaalton at ubuntu.com
Tue Feb 7 14:14:09 UTC 2023


Andrei Gherzan kirjoitti 1.2.2023 klo 18.52:
> [Impact]
> 
> A use-after-free vulnerability was found in __nfs42_ssc_open() in
> fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
> conduct a remote denial.
> 
> [Fix]
> 
> Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.
> 
> Backport was required as 1913cdf56cb5 ("NFSD: Replace boolean fields in
> struct nfsd4_copy") requires adaptations for this patch to match the
> removed struct fields. For the nfsd4_do_async_copy conflict there are
> multiple changes affecting the backport but the code path is simple to
> adapt for handling of the nfsd4_interssc_disconnect call.
> 
> [Potential regression]
> 
> None expected, low.
> 
> [Tests]
> 
> * Build test
> * Runtime test
>    * boot a new Jammy/Focal VM instance
>    * loaded nfsd kernel module
> 
> Dai Ngo (1):
>    NFSD: fix use-after-free in __nfs42_ssc_open()
> 
>   fs/nfsd/nfs4proc.c | 22 ++++++----------------
>   1 file changed, 6 insertions(+), 16 deletions(-)
> 

applied to both, thanks

-- 
t




More information about the kernel-team mailing list