Message ID | 20230123153844.75571-1-andrei.gherzan@canonical.com |
---|---|
Headers | show |
Series | CVE-2022-4379 | expand |
On 1/23/23 8:38 AM, Andrei Gherzan wrote: > [Impact] > > A use-after-free vulnerability was found in __nfs42_ssc_open() in > fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to > conduct a remote denial. > > [Fix] > > Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream. > Backport was required (see the patch for more details). > > [Potential regression] > > None expected, low. > > [Tests] > > * Build test > * Runtime test > * boot a new Kinetic VM instance > * loaded nfsd kernel module > * exported on the VM a path and mounted on a client via NFSv4 > * no errors or functionality impact observed > > Dai Ngo (1): > NFSD: fix use-after-free in __nfs42_ssc_open() > > fs/nfsd/nfs4proc.c | 22 ++++++---------------- > 1 file changed, 6 insertions(+), 16 deletions(-) > Acked-by: Tim Gardner <tim.gardner@canonical.com>
On 23.01.23 16:38, Andrei Gherzan wrote: > [Impact] > > A use-after-free vulnerability was found in __nfs42_ssc_open() in > fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to > conduct a remote denial. > > [Fix] > > Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream. > Backport was required (see the patch for more details). > > [Potential regression] > > None expected, low. > > [Tests] > > * Build test > * Runtime test > * boot a new Kinetic VM instance > * loaded nfsd kernel module > * exported on the VM a path and mounted on a client via NFSv4 > * no errors or functionality impact observed > > Dai Ngo (1): > NFSD: fix use-after-free in __nfs42_ssc_open() > > fs/nfsd/nfs4proc.c | 22 ++++++---------------- > 1 file changed, 6 insertions(+), 16 deletions(-) > Is this actually the same change as for Kinetic? Cannot tell but looking extremely similar... Even more reason that it should be ONE submission. -Stefan Acked-by: Stefan Bader <stefan.bader@canonical.com>
On Fri, 27 Jan 2023, 09:10 Stefan Bader, <stefan.bader@canonical.com> wrote: > On 23.01.23 16:38, Andrei Gherzan wrote: > > [Impact] > > > > A use-after-free vulnerability was found in __nfs42_ssc_open() in > > fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to > > conduct a remote denial. > > > > [Fix] > > > > Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream. > > Backport was required (see the patch for more details). > > > > [Potential regression] > > > > None expected, low. > > > > [Tests] > > > > * Build test > > * Runtime test > > * boot a new Kinetic VM instance > > * loaded nfsd kernel module > > * exported on the VM a path and mounted on a client via NFSv4 > > * no errors or functionality impact observed > > > > Dai Ngo (1): > > NFSD: fix use-after-free in __nfs42_ssc_open() > > > > fs/nfsd/nfs4proc.c | 22 ++++++---------------- > > 1 file changed, 6 insertions(+), 16 deletions(-) > > > Is this actually the same change as for Kinetic? Cannot tell but looking > extremely similar... Even more reason that it should be ONE submission. > Noted. Thanks for the review. Andrei
On 23.01.23 16:38, Andrei Gherzan wrote: > [Impact] > > A use-after-free vulnerability was found in __nfs42_ssc_open() in > fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to > conduct a remote denial. > > [Fix] > > Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream. > Backport was required (see the patch for more details). > > [Potential regression] > > None expected, low. > > [Tests] > > * Build test > * Runtime test > * boot a new Kinetic VM instance > * loaded nfsd kernel module > * exported on the VM a path and mounted on a client via NFSv4 > * no errors or functionality impact observed > > Dai Ngo (1): > NFSD: fix use-after-free in __nfs42_ssc_open() > > fs/nfsd/nfs4proc.c | 22 ++++++---------------- > 1 file changed, 6 insertions(+), 16 deletions(-) > Applied to jammy:linux/master-next. Thanks. -Stefan