A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled extra inode size for extended attributes. Quoting the upstream commit below: "In the calculation formula, all values except s_inode_size and i_extra_size are fixed values. When i_extra_size is the maximum value s_inode_size - EXT4_GOOD_OLD_INODE_SIZE, min_offs is -4 and free is -8. The value overflows. As a result, the preceding issue is triggered when memcpy is executed." Patch series: https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1@huawei.com/ Upstream fix: https://github.com/torvalds/linux/commit/67d7d8ad99be
This issue was fixed upstream in version 6.0-rc1. The kernel packages as shipped in the following Red Hat products were previously updated to a version that contains the fix via the following errata: kernel in Red Hat Enterprise Linux 9 https://access.redhat.com/errata/RHSA-2023:2458 kernel-rt in Red Hat Enterprise Linux 9 https://access.redhat.com/errata/RHSA-2023:2148
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:6901 https://access.redhat.com/errata/RHSA-2023:6901
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:7077 https://access.redhat.com/errata/RHSA-2023:7077
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:0412