APPLIED: [SRU][F][PATCH 0/1] CVE-2024-41073

Stefan Bader stefan.bader at canonical.com
Wed Sep 25 11:42:05 UTC 2024


On 13.09.24 10:12, Koichiro Den wrote:
> [Impact]
> 
> nvme: avoid double free special payload
> 
> If a discard request needs to be retried, and that retry may fail before
> a new special payload is added, a double free will result. Clear the
> RQF_SPECIAL_LOAD when the request is cleaned.
> 
> [Backport]
> 
> Adjusted context due to a missing commit 3973e15fa534 ("nvme: use bvec_virt")
> 
> [Fix]
> 
> Noble:  fixed via stable (pending)
> Jammy:  fixed via stable (pending)
> Focal:  Backport - adjusted contexts due to a missing commit
> Bionic: fix sent to esm ML
> Xenial: not affected
> Trusty: not affected
> 
> [Test case]
> 
> Compile and boot tested
> 
> [Where problem could occur]
> 
> This fix affects those who use any NVMe device, an issue with this fix
> would be visible to the user via unpredicted system behavior or a system
> crash induced by a double free under specific conditions.
> 
> 
> Chunguang Xu (1):
>    nvme: avoid double free special payload
> 
>   drivers/nvme/host/core.c | 1 +
>   1 file changed, 1 insertion(+)
> 

Applied to focal:linux/master-next. Thanks.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 48643 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240925/4930050a/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240925/4930050a/attachment-0001.sig>


More information about the kernel-team mailing list