[SRU][N][PATCH 0/1] CVE-2024-53173

Bethany Jamison bethany.jamison at canonical.com
Tue Mar 11 21:02:19 UTC 2025


[Impact]

NFSv4.0: Fix a use-after-free problem in the asynchronous open()

When two threads are opening files at the same time, and are forced to 
abort before a reply is seen, they call to nfs_release_seqid() in 
nfs4_opendata_free() which can result in a use-after-free of the pointer 
to the defunct rpc task of the other thread.
The fix is to ensure that if the RPC call is aborted before the call to
nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()
in nfs4_open_release() before the rpc_task is freed.

[Fix]

Oracular: released
Noble:	  Clean cherry-pick from linux-6.11.y
Jammy:	  pending (5.15.0-135.146)
Focal:	  pending (5.4.0-210.230)
Bionic:	  fix sent to esm ML
Xenial:	  fix sent to esm ML
Trusty:	  not fixed as it is not a critical CVE

This is technically a resubmitted patchset to the ML. I put the wrong CVE
ID in the subject line - I won't mark it as a v2 because this CVE ID has not
been seen on the ML yet though.

[Test Case]

Compile and boot tested.

[Where problems could occur]

The fix affects those who use client-side procedure declarations for NFSv4,
and issue with this fix would be visible to the user via unexpected system
behavior.

Trond Myklebust (1):
  NFSv4.0: Fix a use-after-free problem in the asynchronous open()

 fs/nfs/nfs4proc.c | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

-- 
2.43.0




More information about the kernel-team mailing list