Description
In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.
Solution(s)
amazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-228amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-228-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-229amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-173-137-229-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-253amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-253-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-254amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-177-139-254-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-181-140-257amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo
References