Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp3052779rwb; Fri, 11 Nov 2022 21:04:20 -0800 (PST) X-Google-Smtp-Source: AA0mqf7v6rrNrBiSWyL2HLz72xaZ8ljvNrjUXOy+2fFsPpQseNQRQdC55UbTV6VW4SJkYrecgQqX X-Received: by 2002:a05:6402:184b:b0:461:7f5a:e04e with SMTP id v11-20020a056402184b00b004617f5ae04emr4096135edy.389.1668229460543; Fri, 11 Nov 2022 21:04:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668229460; cv=none; d=google.com; s=arc-20160816; b=tt31vAlh1+6zUQzJeWd5M/ce9rWNi4RvvzGmNtw3I4pgdcFqMi0yrPQ7vHWlKhEodd Cz2redSBLZO2br5z39TIfV8RnXxFMgixrh1d9+AviEF45Z88zHyl5JtayYtSR13w7EbT j21hJrIwrf7HitK+3MJx7/wYRP32dwzUb/IX31qRaiNqcawwuEwXbzx0KrYwKx5wANBY tyRzLUh2AUBQ4pZyCwnn4C8TTYegP5R2/xlO7rj7in+Rn6bZtfSGZrBu0Qx1nJ10tAJg ynCiDRgLRUvELM9CfvgEKc4ArfU/h/vb7UOs0NkffNsJgD7Fsy8fQReUP5br3xq77Y/L eWKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :mime-version:user-agent:date:message-id:subject:from:cc:to; bh=v2eKe54X0IkdUqg843Wf7gwsAooJqfygW1Sth/GwQsU=; b=JtPdCec+M+/Pq6EYQ45MmMXMbe6HGguBixDaNVVHI7rnxRXOeRqoVNssfJQu1B4s6M yNAR9DKlWidqsO1ZwKI0M9bpsTIzC9kPU9/OqjdO2n/DQ/7tIBmGnIFid7uqAgIBiduY Cryac+JB/mj8dXcogvdFcF+5FFiHgWfr7ZZK2BtUlhr+XwKdfiG56qui+ylSXrKBDtjm 90BeYqRwgEd7GI0uNxeBslD1ZJ34A7tkKhLOCcSIVj3Vb3VxjrV5gdpyzIGDrWY9LAye mREdy7aOF6+cpAySPQniXyV/nNMYyDLUt3mcLQSXw3QEYEJZiNy8h6tpRtWfsU8UI5ny t49Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w16-20020a05640234d000b004619867344csi2076514edc.0.2022.11.11.21.03.42; Fri, 11 Nov 2022 21:04:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230170AbiKLFCC (ORCPT + 99 others); Sat, 12 Nov 2022 00:02:02 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54168 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229800AbiKLFCB (ORCPT ); Sat, 12 Nov 2022 00:02:01 -0500 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2C26D1EEDD for ; Fri, 11 Nov 2022 21:01:59 -0800 (PST) Received: from dggemv703-chm.china.huawei.com (unknown [172.30.72.55]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4N8NhT15F0zHvm5; Sat, 12 Nov 2022 13:01:29 +0800 (CST) Received: from kwepemm600019.china.huawei.com (7.193.23.64) by dggemv703-chm.china.huawei.com (10.3.19.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Sat, 12 Nov 2022 13:01:45 +0800 Received: from [10.174.177.210] (10.174.177.210) by kwepemm600019.china.huawei.com (7.193.23.64) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Sat, 12 Nov 2022 13:01:44 +0800 To: , CC: , , From: yangerkun Subject: Question about CVE-2022-43945 Message-ID: <48b858aa-028b-1f56-3740-e59eb7a5fca2@huawei.com> Date: Sat, 12 Nov 2022 13:01:44 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.5.0 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.177.210] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To kwepemm600019.china.huawei.com (7.193.23.64) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Hi, Chuck Lever, CVE-2022-43945(https://nvd.nist.gov/vuln/detail/CVE-2022-43945) describe that a normal request header ended with garbage data can trigger the nfsd overflow since nfsd share the request and response with the same pages array. It seems that the patchset(https://lore.kernel.org/linux-nfs/166204973526.1435.6068003336048840051.stgit@manet.1015granger.net/T/#t) has solved NFSv2/NFSv3, but leave NFSv4 still vulnerably? Another question, for stable branch like lts-5.10, since NFSv2/NFSv3 did not switch to xdr_stream, the nfs_request_too_big in nfsd_dispatch will reject the request like READ/READDIR with too large request. So it seems branch without that "switch" seems ok for NFSv2/NFSv3, but NFSv3 still vulnerably. right? Looking forward to your reply! Thanks, Erkun Yang