From patchwork Fri May 3 17:22:31 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Magali Lemes X-Patchwork-Id: 1931129 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=185.125.189.65; helo=lists.ubuntu.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=patchwork.ozlabs.org) Received: from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4VWHgp31xQz20fb for ; Sat, 4 May 2024 03:23:01 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=lists.ubuntu.com) by lists.ubuntu.com with esmtp (Exim 4.86_2) (envelope-from ) id 1s2wcK-0002V7-3u; Fri, 03 May 2024 17:22:40 +0000 Received: from smtp-relay-internal-0.internal ([10.131.114.225] helo=smtp-relay-internal-0.canonical.com) by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1s2wcH-0002Ut-Sn for kernel-team@lists.ubuntu.com; Fri, 03 May 2024 17:22:37 +0000 Received: from mail-pl1-f200.google.com (mail-pl1-f200.google.com [209.85.214.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id B6BD13F2B7 for ; Fri, 3 May 2024 17:22:37 +0000 (UTC) Received: by mail-pl1-f200.google.com with SMTP id d9443c01a7336-1e54e6ba9a1so89736755ad.1 for ; Fri, 03 May 2024 10:22:37 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714756956; x=1715361756; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=iE1JoKbiWS2cnlktNnu8TWzt045+xEc/gg7DOlladj4=; b=ovtVQtReOjm0gTWPB2U6GvB5YAkGNPPYgd2cUM3fTLgvhAnx24P3g/4m6Ug3D0IRRk p1stdGg7dkUk4i6WbA1jU+D6r8fohWI2kaA4yZs1RPM6L4MmNU4xguSypcTMECCtC8wM qJgBMs+E5A0zy3gYtWO1pcoMbGUselv1SGUtG4GYf7fKRLenBZWgNNjTf/xyBbGLExhU ISg1kMRPxeWakNcOsBMlGL9IBRYZBfHrGt7mMx//eMg95xL1YvJzLJmlCEmiM5TDZmFK FOcKgWI48Y/KpY2+yiIOQqqyDvLKSFfxfmHAnJ3Dl1teqyuVNyljiK7ehdBod5MKhG8J NItQ== X-Gm-Message-State: AOJu0YyahC3F8gjm0rUUEogdz4AbHqxHu5BTv3vfee0sgIo1VbVQZkNH j+o7eAWOUydz+Kj/s11wb4xOqmmUW0xeC5Z8Jjpr9Pa+QfYZ7SWVz3QKLYbu2AyzSGdlB4/JGY9 tj7BrvEaFcxdL+WLLmtVZ+Qnd6yZU6npiPMsLUrL6XSlkM1F1NDbKewk1J04FUnqlMECIDFvnqM /qammQAyWAAw== X-Received: by 2002:a17:902:c948:b0:1eb:61a4:a2bc with SMTP id i8-20020a170902c94800b001eb61a4a2bcmr4326889pla.43.1714756955974; Fri, 03 May 2024 10:22:35 -0700 (PDT) X-Google-Smtp-Source: AGHT+IG94eA/LjD2M5eASqgVTGEMQAfh1EjV0D7cpG8pmKoTkE8/Mlr2ht6Ty4b/22h022eXFeUNRA== X-Received: by 2002:a17:902:c948:b0:1eb:61a4:a2bc with SMTP id i8-20020a170902c94800b001eb61a4a2bcmr4326868pla.43.1714756955544; Fri, 03 May 2024 10:22:35 -0700 (PDT) Received: from magali.. ([2804:14c:14a:814f:3314:492e:f3c:afaf]) by smtp.gmail.com with ESMTPSA id i11-20020a17090332cb00b001e9685ad053sm3518503plr.248.2024.05.03.10.22.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 May 2024 10:22:35 -0700 (PDT) From: Magali Lemes To: kernel-team@lists.ubuntu.com Subject: [SRU][F/J/M][PATCH 0/1] CVE-2024-23307 Date: Fri, 3 May 2024 14:22:31 -0300 Message-Id: <20240503172232.1232019-1-magali.lemes@canonical.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" [Impact] An integer overflow flaw was found in the raid5 subsystem in the Linux kernel. Concurrent executions of raid5_cache_count() and raid5_set_cache_size() may lead to inconsistent reads of conf->max_nr_stripes and conf->min_nr_stripes, such that conf->min_nr_stripes may exceed conf->max_nr_stripes and potentially cause an integer overflow. [Backport] Clean cherry-pick from linux-6.6.y. [Test] Compile and boot tested. [Where problems could occur] Any problems would be limited to systems that use RAID 4/5/6 configurations. As the fix touches code related to stripe cache, although unlikely, this could impact performance. Gui-Dong Han (1): md/raid5: fix atomicity violation in raid5_cache_count drivers/md/raid5.c | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) Acked-by: Tim Gardner Acked-by: Cengiz Can