APPLIED[K]: [UBUNTU Kinetic,OEM-6.0 0/1] CVE-2023-0469

Stefan Bader stefan.bader at canonical.com
Thu Feb 23 10:31:50 UTC 2023


On 09.02.23 19:46, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> A double fput on io_uring may lead to a use-after-free condition.
> 
> [Potential regression]
> io_uring might be broken, lead to kernel lockups, crashes, or memory leaks.
> 
> [Further review]
> In both cases, all the callers were looked up for any extra fput, all were
> considered safe.
> 
> [Testing]
> io_uring programs exercising the path were used, also under memcg, exercising
> memory allocation failure conditions.
> 
> Lin Ma (1):
>    io_uring/filetable: fix file reference underflow
> 
>   io_uring/filetable.c | 2 --
>   1 file changed, 2 deletions(-)
> 

Applied to kinetic:linux/master-next. Thanks.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 44613 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230223/e2d0b7d2/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230223/e2d0b7d2/attachment-0001.sig>


More information about the kernel-team mailing list