From patchwork Wed Sep 6 22:30:53 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yuxuan Luo X-Patchwork-Id: 1830602 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=WnfUuSyS; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=185.125.189.65; helo=lists.ubuntu.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=patchwork.ozlabs.org) Received: from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4RgxtJ73pKz1yh1 for ; Thu, 7 Sep 2023 08:31:20 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=lists.ubuntu.com) by lists.ubuntu.com with esmtp (Exim 4.86_2) (envelope-from ) id 1qe13B-0003FP-Ky; Wed, 06 Sep 2023 22:31:06 +0000 Received: from smtp-relay-internal-1.internal ([10.131.114.114] helo=smtp-relay-internal-1.canonical.com) by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1qe135-0003EI-13 for kernel-team@lists.ubuntu.com; Wed, 06 Sep 2023 22:30:59 +0000 Received: from mail-qv1-f72.google.com (mail-qv1-f72.google.com [209.85.219.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id D6D443F18F for ; Wed, 6 Sep 2023 22:30:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1694039458; bh=IlU/3XMEosUI+WvI7ImCWcNOaM9rZRXjvf42zECVsc4=; h=From:To:Subject:Date:Message-Id:MIME-Version:Content-Type; b=WnfUuSySoreut2FmgJetNaqRtCyAOeKsSw0Iqqj0iVNEWHNAlk43jp3xr5kcxHkuy fetGdsJT4OO+myRnP3JXValBWyZI0ihUEtryVOJ8YzZU/XaJATRkOuM3NykEo+ruXK GYl3ii/h/xSWVZJJFR0/z6DtXfIdP98V7K83MRdXbXbbAEdsanIfiCsmEEj2H6cKEU lQIiTQLGxO0LVFVaGKOmUb6SEtwSa+kJMY1EPzbqO+uRj+4JsSIvUBwQiFXWmdvMN7 PUYL23k6I3hIdjUW/gF4sZP77md0rjRabGkSrA0UItGlZTyT8VzAIafCUBvt/OYiy1 0vypB438XdIRA== Received: by mail-qv1-f72.google.com with SMTP id 6a1803df08f44-649fac91500so12798366d6.1 for ; Wed, 06 Sep 2023 15:30:58 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1694039457; x=1694644257; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=IlU/3XMEosUI+WvI7ImCWcNOaM9rZRXjvf42zECVsc4=; b=gAgFruWIw4wPe0K7uXcGHYpajal0GJkpeBtBUHWHNPkevMGDgNz1zUoS4ZRhQr+wuK hsIhfUymi+lHO/mBlr3Gc0QQTrL1T4jqAK4uYykzYUiBDEYNf4Mbbu4VVVeIt56QFSd1 PYvWsyLsNiXSgWB+aGcvy2fh0pJL3ZscOUpH4zoitiiLb31j5EaCdEj/cIgVTHkz1i60 G7cax7h7eYjBCygFow/Xlz+lpWXeSCGv75gBuebwxCV9Pjvn8L7WUJN4aCcvBy9I451r zgE/2VyvEmyKlkHow2OM0t3UdlDZnH8OJB6V05Ral48tGCf6ys+48Rz4DlACRip3bMxb fcDg== X-Gm-Message-State: AOJu0YwsyZnWgocxn6rWMD5+F8YLYQAQDW7uy4atYpUb+WlncwuNFAkP lNfKWFRmetEh/pZI6dwKJdSM/ym86azXVQbq/UX4W8SrLwxqOeajvouZlNxL96AVwGibXeb7e9Z PJylX04zCBV4YioDCydpZaqzDd0MznBRx2JbO8sAp1+J722kotQ== X-Received: by 2002:ad4:5f0d:0:b0:651:6604:bee6 with SMTP id fo13-20020ad45f0d000000b006516604bee6mr1491841qvb.30.1694039457576; Wed, 06 Sep 2023 15:30:57 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEVsZ6KYWTrenVnFDzAVW8I4jHcH1z9ryIwoXXTfSWruBxvI5WAqvbBshfbYojuTj+AVMD90w== X-Received: by 2002:ad4:5f0d:0:b0:651:6604:bee6 with SMTP id fo13-20020ad45f0d000000b006516604bee6mr1491821qvb.30.1694039457227; Wed, 06 Sep 2023 15:30:57 -0700 (PDT) Received: from cache-ubuntu.hsd1.nj.comcast.net ([2601:86:200:98b0:60d1:6245:8cf8:9b33]) by smtp.gmail.com with ESMTPSA id z3-20020a0cda83000000b0064f70c57531sm5787589qvj.57.2023.09.06.15.30.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Sep 2023 15:30:56 -0700 (PDT) From: Yuxuan Luo To: kernel-team@lists.ubuntu.com Subject: [SRU][F/J/L][PATCH 0/1] CVE-2023-3772 Date: Wed, 6 Sep 2023 18:30:53 -0400 Message-Id: <20230906223055.35186-1-yuxuan.luo@canonical.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" [Impact] A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service. [Backport] Clean cherry picks. There are two .patch files because the one for Jammy and Lunar cannot be applied clean on Focal using 'git am'. [Test] Compile and boot tested. [Potential Regression] Expect minial regression. Lin Ma (1): xfrm: add NULL check in xfrm_update_ae_params net/xfrm/xfrm_user.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Acked-by: Stefan Bader Acked-by: Tim Gardner