summaryrefslogtreecommitdiffstats
path: root/Kbuild
diff options
context:
space:
mode:
authorJ. Bruce Fields <bfields@redhat.com>2017-10-17 20:38:49 -0400
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2019-02-15 08:07:39 +0100
commit877362fd15f050a0ca063e5759acafd69b6bdb66 (patch)
tree0be2d972886d0b9accd4816e821217740a156b94 /Kbuild
parentf92c45b79824435ef7e2884222122a90908f2374 (diff)
downloadlinux-stable-877362fd15f050a0ca063e5759acafd69b6bdb66.tar.gz
linux-stable-877362fd15f050a0ca063e5759acafd69b6bdb66.tar.bz2
linux-stable-877362fd15f050a0ca063e5759acafd69b6bdb66.zip
nfsd4: catch some false session retries
commit 53da6a53e1d414e05759fa59b7032ee08f4e22d7 upstream. The spec allows us to return NFS4ERR_SEQ_FALSE_RETRY if we notice that the client is making a call that matches a previous (slot, seqid) pair but that *isn't* actually a replay, because some detail of the call doesn't actually match the previous one. Catching every such case is difficult, but we may as well catch a few easy ones. This also handles the case described in the previous patch, in a different way. The spec does however require us to catch the case where the difference is in the rpc credentials. This prevents somebody from snooping another user's replies by fabricating retries. (But the practical value of the attack is limited by the fact that the replies with the most sensitive data are READ replies, which are not normally cached.) Tested-by: Olga Kornievskaia <aglo@umich.edu> Signed-off-by: J. Bruce Fields <bfields@redhat.com> Cc: Salvatore Bonaccorso <carnil@debian.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'Kbuild')
0 files changed, 0 insertions, 0 deletions