From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pg1-f195.google.com ([209.85.215.195]:37923 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726399AbeJFH4P (ORCPT ); Sat, 6 Oct 2018 03:56:15 -0400 Received: by mail-pg1-f195.google.com with SMTP id r77-v6so5413990pgr.5 for ; Fri, 05 Oct 2018 17:55:03 -0700 (PDT) From: Daniel Rosenberg To: stable@vger.kernel.org Cc: Daniel Rosenberg Subject: [PATCH 0/2] A couple recent ext4 CVE fixes Date: Fri, 5 Oct 2018 17:51:27 -0700 Message-Id: <20181006005129.166109-1-drosen@google.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org List-ID: A couple ext4-related CVE fixes were released to other kernels in linux-stable, but didn't cleanly apply to 4.4.y. These are adjusted cherry-picks of Ben Hutching's 3.16.y backports. Theodore Ts'o (2): ext4: add corruption check in ext4_xattr_set_entry() ext4: always verify the magic number in xattr blocks fs/ext4/xattr.c | 28 +++++++++++++++++----------- 1 file changed, 17 insertions(+), 11 deletions(-) -- 2.19.0.605.g01d371f741-goog