ext4: add validity checks for bitmap block numbers
An privileged attacker can cause a crash by mounting a crafted ext4 image which triggers a out-of-bounds read in the function ext4_valid_block_bitmap() in fs/ext4/balloc.c. This issue has been assigned CVE-2018-1093. BugLink: https://bugzilla.kernel.org/show_bug.cgi?id=199181 BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1560782 Reported-by:Wen Xu <wen.xu@gatech.edu> Signed-off-by:
Theodore Ts'o <tytso@mit.edu> Cc: stable@vger.kernel.org
Loading
-
mentioned in commit 5f3c82f8
-
mentioned in commit 62a76899
-
mentioned in commit 56c0effc
-
mentioned in commit 95182313
-
mentioned in commit af9f346d
-
mentioned in commit 56674067
-
mentioned in commit c160d560
-
mentioned in commit 81af0f22
-
mentioned in commit 489aa749
-
mentioned in commit 599cd24b
-
mentioned in commit ed8fc7a9
-
mentioned in commit 15e661f2
-
mentioned in commit af08ddbe
-
mentioned in commit 2af6bebc
-
mentioned in commit 30eda125
-
mentioned in commit 333a2d22
Please sign in to comment