ACK: [SRU][B][PATCH 0/2] CVE-2019-19449
stefan.bader at canonical.com
Fri Oct 1 08:44:01 UTC 2021
On 30.09.21 20:28, Luke Nowakowski-Krijger wrote:
> Mounting a crafted f2fs file system with a segment count in a section
> that is less than segs_per_sec causes out-of-boundary memory access
> during fs initalization.
> Changed f2fs_info to f2fs_msg due to the fact that the f2fs_info
> infastructure is not present and would require backporting many patches
> to implement.
> [Test case]
> Reproduced bug with syzbot reproducer
> with slight modification to target a valid loop device.
> Confirmed that after the patches were applied the fs reports that there
> are malformed segments/sections and mounting the file system fails,
> which stops the initialization from continuing and preventing the
> out-of-boundary memory access.
> [Potential regression]
> The patches add checks that are a superset of the previous checks, which
> might cause some filesystems that succeeded in mounting to now fail.
> Luke Nowakowski-Krijger (1):
> f2fs: fix to do sanity check on segment/section count
> Wang Xiaojun (1):
> f2fs: fix wrong total_sections check and fsmeta check
> fs/f2fs/segment.h | 1 +
> fs/f2fs/super.c | 15 +++++++++++----
> 2 files changed, 12 insertions(+), 4 deletions(-)
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: OpenPGP digital signature
More information about the kernel-team