![]() An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5.
This issue leads to a segmentation fault and possibly arbitrary code
execution via a specially crafted filesystem.
Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit
|
||
---|---|---|
.. | ||
0001-libext2fs-add-sanity-check-to-extent-manipulation.patch | ||
Config.in | ||
Config.in.host | ||
e2fsprogs.hash | ||
e2fsprogs.mk |