<div dir="auto"><div><div data-smartmail="gmail_signature">On Fri, 27 Jan 2023, 09:07 Stefan Bader, <<a href="mailto:stefan.bader@canonical.com">stefan.bader@canonical.com</a>> wrote:<br></div><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On 23.01.23 16:20, Andrei Gherzan wrote:<br>
> [Impact]<br>
> <br>
> A use-after-free vulnerability was found in __nfs42_ssc_open() in<br>
> fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to<br>
> conduct a remote denial.<br>
> <br>
> [Fix]<br>
> <br>
> Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.<br>
> Backport was required (see the patch for more details).<br>
> <br>
> [Potential regression]<br>
> <br>
> None expected, low.<br>
> <br>
> [Tests]<br>
> <br>
> * Build test<br>
> * Runtime test<br>
> * boot a new Kinetic VM instance<br>
> * loaded nfsd kernel module<br>
> * exported on the VM a path and mounted on a client via NFSv4<br>
> * no errors or functionality impact observed<br>
> <br>
> Dai Ngo (1):<br>
> NFSD: fix use-after-free in __nfs42_ssc_open()<br>
> <br>
> fs/nfsd/nfs4proc.c | 22 ++++++----------------<br>
> 1 file changed, 6 insertions(+), 16 deletions(-)<br>
> <br>
This one would greatly benefit from doing as one submission for all affected <br>
series. For one this keeps review and application of all parts tied together. <br>
Second there is sometimes the benefit of seeing the evolution of backport <br>
efforts. Last remember that people are looking at this with little context and <br>
often little time. The comment about the backport if served condensed. I think <br>
what you say is "adjusted last hunk: test condition of removed code was changed <br>
later".<br></blockquote></div></div><div dir="auto"><br></div><div dir="auto">Sure, makes sense. Thanks for the review.</div><div dir="auto"><br></div><div dir="auto">Andrei</div></div>