We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: udf: Fix bogus checksum computation in udf_rename() Syzbot reports uninitialized memory access in udf_rename() when updating checksum of '..' directory entry of a moved directory. This is indeed true as we pass on-stack diriter.fi to the udf_update_tag() and because that has only struct fileIdentDesc included in it and not the impUse or name fields, the checksumming function is going to checksum random stack contents beyond the end of the structure. This is actually harmless because the following udf_fiiter_write_fi() will recompute the checksum from on-disk buffers where everything is properly included. So all that is needed is just removing the bogus calculation.
Reserved 2024-08-17 | Published 2024-08-17 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/9c439311c13fc6faab1921441165c9b8b500c83b
git.kernel.org/...c/c996b570305e7a6910c2ce4cdcd4c22757ffe241
git.kernel.org/...c/fe2ead240c31e8d158713beca9d0681a6e6a53ab
git.kernel.org/...c/40d7b3ed52449d36143bab8d3e70926aa61a60f4
git.kernel.org/...c/27ab33854873e6fb958cb074681a0107cc2ecc4c
Support options