ACK/Cmnt: [SRU][Jammy][PATCH 0/1] CVE-2022-4379

Stefan Bader stefan.bader at canonical.com
Fri Jan 27 09:10:45 UTC 2023


On 23.01.23 16:38, Andrei Gherzan wrote:
> [Impact]
> 
> A use-after-free vulnerability was found in __nfs42_ssc_open() in
> fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to
> conduct a remote denial.
> 
> [Fix]
> 
> Backported 75333d48f92256a0dec91dbf07835e804fc411c0 from upstream.
> Backport was required (see the patch for more details).
> 
> [Potential regression]
> 
> None expected, low.
> 
> [Tests]
> 
> * Build test
> * Runtime test
>    * boot a new Kinetic VM instance
>    * loaded nfsd kernel module
>    * exported on the VM a path and mounted on a client via NFSv4
>    * no errors or functionality impact observed
> 
> Dai Ngo (1):
>    NFSD: fix use-after-free in __nfs42_ssc_open()
> 
>   fs/nfsd/nfs4proc.c | 22 ++++++----------------
>   1 file changed, 6 insertions(+), 16 deletions(-)
> 
Is this actually the same change as for Kinetic? Cannot tell but looking 
extremely similar... Even more reason that it should be ONE submission.

-Stefan


Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230127/978e399f/attachment.sig>


More information about the kernel-team mailing list