public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
* CVE-2020-16120 and CVE-2021-3428
@ 2022-04-07 10:40 achtol
  2022-04-07 11:21 ` Greg KH
  0 siblings, 1 reply; 3+ messages in thread
From: achtol @ 2022-04-07 10:40 UTC (permalink / raw)
  To: stable

Hello,

It seems the fix commits for a couple of CVEs have not been cherry 
picked in the current linux-5.4.y branch (v5.4.188, currently):

---

CVE-2020-16120:

<https://nvd.nist.gov/vuln/detail/CVE-2020-16120> references the 
following mainline commits:

     d1d04ef8572bc8c22265057bd3d5a79f223f8f52 "ovl: stack file ops" 
(break commit)
     56230d956739b9cb1cbde439d76227d77979a04d "ovl: verify permissions 
in ovl_path_open()"
     48bd024b8a40d73ad6b086de2615738da0c7004f "ovl: switch to mounter 
creds in readdir"
     05acefb4872dae89e772729efb194af754c877e8 "ovl: check permission to 
open real file"
     b6650dab404c701d7fe08a108b746542a934da84 "ovl: do not fail because 
of O_NOATIME"

The CVE description says the last commit in the list above fixes a 
regression introduced by these two commits:

     130fdbc3d1f9966dd4230709c30f3768bccd3065 "ovl: pass correct flags 
for opening real directory"
     292f902a40c11f043a5ca1305a114da0e523eaa3 "ovl: call secutiry hook 
in ovl_real_ioctl()"

---

CVE-2021-3428:

According to <https://bugzilla.suse.com/show_bug.cgi?id=1173485>, the 
mainline fix commits are:

     d176b1f62f24 "ext4: handle error of ext4_setup_system_zone() on 
remount"
     bf9a379d0980 "ext4: don't allow overlapping system zones"
     ce9f24cccdc0 "ext4: check journal inode extents more carefully"

Of these, only the first two have been cherry-picked.

---

Half of these commits may be cherry-picked without a conflict. I wonder 
why they have not been applied and cannot find any discussion about them 
on this mailing list. Is it an oversight? Or because the v5.4 line is 
not affected? Some other reason?

Regards,

achtol


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: CVE-2020-16120 and CVE-2021-3428
  2022-04-07 10:40 CVE-2020-16120 and CVE-2021-3428 achtol
@ 2022-04-07 11:21 ` Greg KH
  2022-04-14 10:54   ` Greg KH
  0 siblings, 1 reply; 3+ messages in thread
From: Greg KH @ 2022-04-07 11:21 UTC (permalink / raw)
  To: achtol; +Cc: stable

On Thu, Apr 07, 2022 at 12:40:51PM +0200, achtol wrote:
> Hello,
> 
> It seems the fix commits for a couple of CVEs have not been cherry picked in
> the current linux-5.4.y branch (v5.4.188, currently):
> 
> ---
> 
> CVE-2020-16120:
> 
> <https://nvd.nist.gov/vuln/detail/CVE-2020-16120> references the following
> mainline commits:
> 
>     d1d04ef8572bc8c22265057bd3d5a79f223f8f52 "ovl: stack file ops" (break
> commit)
>     56230d956739b9cb1cbde439d76227d77979a04d "ovl: verify permissions in
> ovl_path_open()"
>     48bd024b8a40d73ad6b086de2615738da0c7004f "ovl: switch to mounter creds
> in readdir"
>     05acefb4872dae89e772729efb194af754c877e8 "ovl: check permission to open
> real file"
>     b6650dab404c701d7fe08a108b746542a934da84 "ovl: do not fail because of
> O_NOATIME"
> 
> The CVE description says the last commit in the list above fixes a
> regression introduced by these two commits:
> 
>     130fdbc3d1f9966dd4230709c30f3768bccd3065 "ovl: pass correct flags for
> opening real directory"
>     292f902a40c11f043a5ca1305a114da0e523eaa3 "ovl: call secutiry hook in
> ovl_real_ioctl()"
> 
> ---
> 
> CVE-2021-3428:
> 
> According to <https://bugzilla.suse.com/show_bug.cgi?id=1173485>, the
> mainline fix commits are:
> 
>     d176b1f62f24 "ext4: handle error of ext4_setup_system_zone() on remount"
>     bf9a379d0980 "ext4: don't allow overlapping system zones"
>     ce9f24cccdc0 "ext4: check journal inode extents more carefully"
> 
> Of these, only the first two have been cherry-picked.
> 
> ---
> 
> Half of these commits may be cherry-picked without a conflict.

Which half?

> I wonder why
> they have not been applied and cannot find any discussion about them on this
> mailing list. Is it an oversight? Or because the v5.4 line is not affected?
> Some other reason?

If you can provide a working set of patches backported, I will be glad
to review them and apply them if needed.

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: CVE-2020-16120 and CVE-2021-3428
  2022-04-07 11:21 ` Greg KH
@ 2022-04-14 10:54   ` Greg KH
  0 siblings, 0 replies; 3+ messages in thread
From: Greg KH @ 2022-04-14 10:54 UTC (permalink / raw)
  To: achtol; +Cc: stable

On Thu, Apr 07, 2022 at 01:21:02PM +0200, Greg KH wrote:
> On Thu, Apr 07, 2022 at 12:40:51PM +0200, achtol wrote:
> > Hello,
> > 
> > It seems the fix commits for a couple of CVEs have not been cherry picked in
> > the current linux-5.4.y branch (v5.4.188, currently):
> > 
> > ---
> > 
> > CVE-2020-16120:
> > 
> > <https://nvd.nist.gov/vuln/detail/CVE-2020-16120> references the following
> > mainline commits:
> > 
> >     d1d04ef8572bc8c22265057bd3d5a79f223f8f52 "ovl: stack file ops" (break
> > commit)
> >     56230d956739b9cb1cbde439d76227d77979a04d "ovl: verify permissions in
> > ovl_path_open()"
> >     48bd024b8a40d73ad6b086de2615738da0c7004f "ovl: switch to mounter creds
> > in readdir"
> >     05acefb4872dae89e772729efb194af754c877e8 "ovl: check permission to open
> > real file"
> >     b6650dab404c701d7fe08a108b746542a934da84 "ovl: do not fail because of
> > O_NOATIME"
> > 
> > The CVE description says the last commit in the list above fixes a
> > regression introduced by these two commits:
> > 
> >     130fdbc3d1f9966dd4230709c30f3768bccd3065 "ovl: pass correct flags for
> > opening real directory"
> >     292f902a40c11f043a5ca1305a114da0e523eaa3 "ovl: call secutiry hook in
> > ovl_real_ioctl()"
> > 
> > ---
> > 
> > CVE-2021-3428:
> > 
> > According to <https://bugzilla.suse.com/show_bug.cgi?id=1173485>, the
> > mainline fix commits are:
> > 
> >     d176b1f62f24 "ext4: handle error of ext4_setup_system_zone() on remount"
> >     bf9a379d0980 "ext4: don't allow overlapping system zones"
> >     ce9f24cccdc0 "ext4: check journal inode extents more carefully"
> > 
> > Of these, only the first two have been cherry-picked.
> > 
> > ---
> > 
> > Half of these commits may be cherry-picked without a conflict.
> 
> Which half?
> 
> > I wonder why
> > they have not been applied and cannot find any discussion about them on this
> > mailing list. Is it an oversight? Or because the v5.4 line is not affected?
> > Some other reason?
> 
> If you can provide a working set of patches backported, I will be glad
> to review them and apply them if needed.

Given the lack of response here, I am guessing these really are not
needed for 5.4 and older so will drop this from my queue.

If that is not the case, please send a working set of backports.

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2022-04-14 10:54 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-04-07 10:40 CVE-2020-16120 and CVE-2021-3428 achtol
2022-04-07 11:21 ` Greg KH
2022-04-14 10:54   ` Greg KH

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox