mbox series

[SRU,Jammy,0/1] CVE-2022-4379

Message ID 20230123153844.75571-1-andrei.gherzan@canonical.com
Headers show
Series CVE-2022-4379 | expand

Message

Andrei Gherzan Jan. 23, 2023, 3:38 p.m. UTC
[Impact]

A use-after-free vulnerability was found in __nfs42_ssc_open() in
fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
conduct a remote denial.

[Fix]

Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.
Backport was required (see the patch for more details).

[Potential regression]

None expected, low.

[Tests]

* Build test
* Runtime test
  * boot a new Kinetic VM instance
  * loaded nfsd kernel module
  * exported on the VM a path and mounted on a client via NFSv4
  * no errors or functionality impact observed

Dai Ngo (1):
  NFSD: fix use-after-free in __nfs42_ssc_open()

 fs/nfsd/nfs4proc.c | 22 ++++++----------------
 1 file changed, 6 insertions(+), 16 deletions(-)

Comments

Tim Gardner Jan. 23, 2023, 6:23 p.m. UTC | #1
On 1/23/23 8:38 AM, Andrei Gherzan wrote:
> [Impact]
> 
> A use-after-free vulnerability was found in __nfs42_ssc_open() in
> fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
> conduct a remote denial.
> 
> [Fix]
> 
> Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.
> Backport was required (see the patch for more details).
> 
> [Potential regression]
> 
> None expected, low.
> 
> [Tests]
> 
> * Build test
> * Runtime test
>    * boot a new Kinetic VM instance
>    * loaded nfsd kernel module
>    * exported on the VM a path and mounted on a client via NFSv4
>    * no errors or functionality impact observed
> 
> Dai Ngo (1):
>    NFSD: fix use-after-free in __nfs42_ssc_open()
> 
>   fs/nfsd/nfs4proc.c | 22 ++++++----------------
>   1 file changed, 6 insertions(+), 16 deletions(-)
> 
Acked-by: Tim Gardner <tim.gardner@canonical.com>
Stefan Bader Jan. 27, 2023, 9:10 a.m. UTC | #2
On 23.01.23 16:38, Andrei Gherzan wrote:
> [Impact]
> 
> A use-after-free vulnerability was found in __nfs42_ssc_open() in
> fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
> conduct a remote denial.
> 
> [Fix]
> 
> Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.
> Backport was required (see the patch for more details).
> 
> [Potential regression]
> 
> None expected, low.
> 
> [Tests]
> 
> * Build test
> * Runtime test
>    * boot a new Kinetic VM instance
>    * loaded nfsd kernel module
>    * exported on the VM a path and mounted on a client via NFSv4
>    * no errors or functionality impact observed
> 
> Dai Ngo (1):
>    NFSD: fix use-after-free in __nfs42_ssc_open()
> 
>   fs/nfsd/nfs4proc.c | 22 ++++++----------------
>   1 file changed, 6 insertions(+), 16 deletions(-)
> 
Is this actually the same change as for Kinetic? Cannot tell but looking 
extremely similar... Even more reason that it should be ONE submission.

-Stefan


Acked-by: Stefan Bader <stefan.bader@canonical.com>
Andrei Gherzan Jan. 27, 2023, 9:40 a.m. UTC | #3
On Fri, 27 Jan 2023, 09:10 Stefan Bader, <stefan.bader@canonical.com> wrote:

> On 23.01.23 16:38, Andrei Gherzan wrote:
> > [Impact]
> >
> > A use-after-free vulnerability was found in __nfs42_ssc_open() in
> > fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
> > conduct a remote denial.
> >
> > [Fix]
> >
> > Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.
> > Backport was required (see the patch for more details).
> >
> > [Potential regression]
> >
> > None expected, low.
> >
> > [Tests]
> >
> > * Build test
> > * Runtime test
> >    * boot a new Kinetic VM instance
> >    * loaded nfsd kernel module
> >    * exported on the VM a path and mounted on a client via NFSv4
> >    * no errors or functionality impact observed
> >
> > Dai Ngo (1):
> >    NFSD: fix use-after-free in __nfs42_ssc_open()
> >
> >   fs/nfsd/nfs4proc.c | 22 ++++++----------------
> >   1 file changed, 6 insertions(+), 16 deletions(-)
> >
> Is this actually the same change as for Kinetic? Cannot tell but looking
> extremely similar... Even more reason that it should be ONE submission.
>

Noted. Thanks for the review.

Andrei
Stefan Bader Jan. 30, 2023, 10:43 a.m. UTC | #4
On 23.01.23 16:38, Andrei Gherzan wrote:
> [Impact]
> 
> A use-after-free vulnerability was found in __nfs42_ssc_open() in
> fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
> conduct a remote denial.
> 
> [Fix]
> 
> Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.
> Backport was required (see the patch for more details).
> 
> [Potential regression]
> 
> None expected, low.
> 
> [Tests]
> 
> * Build test
> * Runtime test
>    * boot a new Kinetic VM instance
>    * loaded nfsd kernel module
>    * exported on the VM a path and mounted on a client via NFSv4
>    * no errors or functionality impact observed
> 
> Dai Ngo (1):
>    NFSD: fix use-after-free in __nfs42_ssc_open()
> 
>   fs/nfsd/nfs4proc.c | 22 ++++++----------------
>   1 file changed, 6 insertions(+), 16 deletions(-)
> 

Applied to jammy:linux/master-next. Thanks.

-Stefan