From patchwork Fri Mar 22 17:10:37 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bethany Jamison X-Patchwork-Id: 1915017 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=185.125.189.65; helo=lists.ubuntu.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=patchwork.ozlabs.org) Received: from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4V1TPD3xnCz1yXt for ; Sat, 23 Mar 2024 04:10:56 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=lists.ubuntu.com) by lists.ubuntu.com with esmtp (Exim 4.86_2) (envelope-from ) id 1rniPl-0003K7-Qr; Fri, 22 Mar 2024 17:10:45 +0000 Received: from smtp-relay-internal-1.internal ([10.131.114.114] helo=smtp-relay-internal-1.canonical.com) by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1rniPj-0003Ji-Pi for kernel-team@lists.ubuntu.com; Fri, 22 Mar 2024 17:10:44 +0000 Received: from mail-io1-f69.google.com (mail-io1-f69.google.com [209.85.166.69]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id CB63D3F626 for ; Fri, 22 Mar 2024 17:10:41 +0000 (UTC) Received: by mail-io1-f69.google.com with SMTP id ca18e2360f4ac-7cf179c3da4so237953539f.2 for ; Fri, 22 Mar 2024 10:10:41 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711127440; x=1711732240; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=qQGWgykwZsdOXqU1kClSaC/YJ6w2i0+o3yYB0OT3Fzc=; b=s8z7ELDR6KijDIITq/eQfdw53yvyyUj6ZiD7z1OxeK13zbja1AmAfWQnVbnPd7LNnE bZQ6Z9+E8ggLKeBpjS5xH8gXwDdnRROOxc+WOvB77Ov2g9HDfeA3k9AarI6mXF4rt6/6 OfewAOeVufA2UFRoDh4hhwVZYqKCcQyRVUq1bSwTATmnvZAEsV0YyQwf52ymPj5WOi6C FZRBlO6Pnu215NaXd0xbGI0ToJeCuCREUab6QKZ88RpDrxuO9GGm5ZOHXXwYRUg13yXN DWlqntGlSxa3MM29iniCy9h4DCB6Q89Bm14Y4hU78q34tldBKQ014tLKPxqQAbv1yYZA i+UA== X-Gm-Message-State: AOJu0YyroUNKkwUurdRuK7vs2bRye+wDM104ousG1nRS/0y+OzEV4oot +b4BPMVH3fD/r6BxvG59wsD3cZ4l9YO9tQpGKzorfjTk9DWdJwpFHMuZAa5budmFT5qPb8xswTE MNl7MF4338vNLW5lPxC6dd4gz6KjarHDfUkTTT/OXdO4KlDSZSBD/1eqIdhkpXSaIUVS3Zl27WY SdvfIhn2sH9Q== X-Received: by 2002:a05:6602:3315:b0:7cc:652d:ce60 with SMTP id b21-20020a056602331500b007cc652dce60mr39354ioz.20.1711127439934; Fri, 22 Mar 2024 10:10:39 -0700 (PDT) X-Google-Smtp-Source: AGHT+IF8VSgJGoACK/W15xGxj5gDhbzBeNFUIBVb3jUhUEc04iTXRXlirltAlvFt9pS/7UVnbGlBLA== X-Received: by 2002:a05:6602:3315:b0:7cc:652d:ce60 with SMTP id b21-20020a056602331500b007cc652dce60mr39333ioz.20.1711127439649; Fri, 22 Mar 2024 10:10:39 -0700 (PDT) Received: from smtp.gmail.com (104-218-69-129.dynamic.lnk.ne.allofiber.net. [104.218.69.129]) by smtp.gmail.com with ESMTPSA id k8-20020a02c768000000b00476d4739990sm606228jao.137.2024.03.22.10.10.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Mar 2024 10:10:39 -0700 (PDT) From: Bethany Jamison To: kernel-team@lists.ubuntu.com Subject: [SRU][M/J/F][PATCH v3 0/1] CVE-2023-52600 Date: Fri, 22 Mar 2024 12:10:37 -0500 Message-Id: <20240322171038.13337-1-bethany.jamison@canonical.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" [Impact] In the Linux kernel, the following vulnerability has been resolved: jfs: fix uaf in jfs_evict_inode When the execution of diMount(ipimap) fails, the object ipimap that has been released may be accessed in diFreeSpecial(). Asynchronous ipimap release occurs when rcu_core() calls jfs_free_node(). Therefore, when diMount(ipimap) fails, sbi->ipimap should not be initialized as ipimap. [Fix] Mantic: Clean cherry-pick Jammy: Mantic patch applied cleanly Focal: Mantic patch applied cleanly Bionic: sent to esm ML Xenial: sent to esm ML Trusty: not going to be fixed by us [Test Case] Compile and boot tested. [Where problems could occur] This affects jfs, issues could occur when initializing the inode map to keep track of files and directories within the filesystem. v2: edited Fix section v3: added version number, forgot to version for v2 resubmission Edward Adam Davis (1): jfs: fix uaf in jfs_evict_inode fs/jfs/jfs_mount.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) Acked-by: Stefan Bader Acked-by: Manuel Diewald