APPLIED: [SRU][Kinetic][PATCH 0/1] CVE-2022-4379

Luke Nowakowski-Krijger luke.nowakowskikrijger at canonical.com
Fri Jan 27 19:43:36 UTC 2023


Applied to kinetic:linux master-next

Thanks!
- Luke

On Mon, Jan 23, 2023 at 7:22 AM Andrei Gherzan <andrei.gherzan at canonical.com>
wrote:

> [Impact]
>
> A use-after-free vulnerability was found in __nfs42_ssc_open() in
> fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
> conduct a remote denial.
>
> [Fix]
>
> Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.
> Backport was required (see the patch for more details).
>
> [Potential regression]
>
> None expected, low.
>
> [Tests]
>
> * Build test
> * Runtime test
>   * boot a new Kinetic VM instance
>   * loaded nfsd kernel module
>   * exported on the VM a path and mounted on a client via NFSv4
>   * no errors or functionality impact observed
>
> Dai Ngo (1):
>   NFSD: fix use-after-free in __nfs42_ssc_open()
>
>  fs/nfsd/nfs4proc.c | 22 ++++++----------------
>  1 file changed, 6 insertions(+), 16 deletions(-)
>
> --
> 2.34.1
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230127/b375d425/attachment.html>


More information about the kernel-team mailing list