ACK: [SRU][N][PATCH 0/1] CVE-2024-53063

Andrei Gherzan andrei.gherzan at canonical.com
Thu Mar 6 15:46:49 UTC 2025


On 25/03/05 12:53pm, Bethany Jamison wrote:
> [Impact]
> 
> NFSv4.0: Fix a use-after-free problem in the asynchronous open()
> 
> When two threads are opening files at the same time, and are forced to 
> abort before a reply is seen, they call to nfs_release_seqid() in 
> nfs4_opendata_free() which can result in a use-after-free of the pointer 
> to the defunct rpc task of the other thread.
> The fix is to ensure that if the RPC call is aborted before the call to
> nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()
> in nfs4_open_release() before the rpc_task is freed.
> 
> [Fix]
> 
> Oracular: released
> Noble:	  Clean cherry-pick from linux-6.11.y
> Jammy:	  pending (5.15.0-135.146)
> Focal:	  pending (5.4.0-210.230)
> Bionic:	  fix sent to esm ML
> Xenial:	  fix sent to esm ML
> Trusty:	  not fixed as it is not a critical CVE
> 
> [Test Case]
> 
> Compile and boot tested.
> 
> [Where problems could occur]
> 
> The fix affects those who use client-side procedure declarations for NFSv4,
> and issue with this fix would be visible to the user via unexpected system
> behavior.
> 
> Trond Myklebust (1):
>   NFSv4.0: Fix a use-after-free problem in the asynchronous open()
> 
>  fs/nfs/nfs4proc.c | 8 +++++---
>  1 file changed, 5 insertions(+), 3 deletions(-)

Acked-by: Andrei Gherzan <andrei.gherzan at canonical.com>

-- 
Andrei Gherzan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20250306/2ac971f3/attachment.sig>


More information about the kernel-team mailing list