Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp282198ybg; Mon, 8 Jun 2020 23:55:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxfAJcvFzW6F7Xn4Lc9tispZP26uBCcYkYXzIXv7B6SPbSB2fqFnBxGxdviPEzV/FIanYcG X-Received: by 2002:a17:906:c455:: with SMTP id ck21mr23669481ejb.342.1591685723861; Mon, 08 Jun 2020 23:55:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591685723; cv=none; d=google.com; s=arc-20160816; b=NRPKXVnDwyOlTpfVu86p4sEoFAN5d9ZaEyVgfxsyMsJ/P2T8hBAWCfva924slNxBTX gzY5csWyqS9ogyBd2qM5toxGLFM3Sv2bWnKzs7R8UNSg7PDqsafWKE6/0UFXqxV+GUoU 7NeCTeIEequ7V9gG5Et0e3BUaqiAZH7QQ8C8oK6Y/Om/yZ4yPO+msE/sOjg2uBsiy7Yd WXbsp8RIV7fNd8n45tsMgr42n9upzcPh6nbvDw5GZD+64KXLWr+7l7qQur3IV7wSsSuJ AXdB9NQdSeIcBuIqfjC/+S43JVmxtUNhtNsejvyln4Rft+UZAwN0fNKN8MEik+JZBdk0 OTgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=mQzYCOh/vT7url+UwkAtXJ7FkQp5RaoAxHHncvoZ0Ng=; b=XYDQXG2UESpJ/Xbm9218zgK8sdQPC2i9H78yNE3nR//t6skA18cT0UhCIrmVxfjT7N oyjHDqFKjr03VdogwCVShEpkVFdZQwV9LqWU+w/ye8W3og8LgodJftcHhhPO+giWQtSA PMbNHk15edVIIt6KOBvk4hnFKiBcjppOy13XxCMnkAgFw+EaX1mV/XuekF3UZTq6oruW J3O5yEeZYwDl1a2emT5AXzFymImNX8wmG0YGtYd8J1DQd9V7tDh/UKIPA5+NEKv00drY HV5jdzDqeQc6Kj3EnVOIcucmZhcuZ9UIW/QYX8KeyBRHLG8fAiDD76+2aUbphUCDZOri dguA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a17si10255027edx.507.2020.06.08.23.55.01; Mon, 08 Jun 2020 23:55:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728007AbgFIGvF (ORCPT + 99 others); Tue, 9 Jun 2020 02:51:05 -0400 Received: from ex13-edg-ou-002.vmware.com ([208.91.0.190]:4711 "EHLO EX13-EDG-OU-002.vmware.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727892AbgFIGvE (ORCPT ); Tue, 9 Jun 2020 02:51:04 -0400 Received: from sc9-mailhost2.vmware.com (10.113.161.72) by EX13-EDG-OU-002.vmware.com (10.113.208.156) with Microsoft SMTP Server id 15.0.1156.6; Mon, 8 Jun 2020 23:51:02 -0700 Received: from vikash-ubuntu-virtual-machine.eng.vmware.com (unknown [10.197.103.194]) by sc9-mailhost2.vmware.com (Postfix) with ESMTP id 75837B12E0; Tue, 9 Jun 2020 02:51:03 -0400 (EDT) From: Vikash Bansal To: CC: , , , , , , , , , , , , , , Subject: [PATCH v4.19.y 0/2] btrfs: Fix for CVE-2019-18885 Date: Tue, 9 Jun 2020 12:20:16 +0530 Message-ID: <20200609065018.26378-1-bvikas@vmware.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain Received-SPF: None (EX13-EDG-OU-002.vmware.com: bvikas@vmware.com does not designate permitted sender hosts) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org CVE Description: NVD Site Link: https://nvd.nist.gov/vuln/detail?vulnId=CVE-2019-18885 It was discovered that the btrfs file system in the Linux kernel did not properly validate metadata, leading to a NULL pointer dereference. An attacker could use this to specially craft a file system image that, when mounted, could cause a denial of service (system crash). [PATCH v4.19.y 1/2]: Backporting of upsream commit 09ba3bc9dd15: btrfs: merge btrfs_find_device and find_device [PATCH v4.19.y 2/2]: Backporting of upstream commit 62fdaa52a3d0: btrfs: Detect unbalanced tree with empty leaf before crashing On NVD site link of "commit 09ba3bc9dd150457c506e4661380a6183af651c1" was given as the fix for this CVE. But the issue was still reproducible. So had to apply patch "Commit 62fdaa52a3d00a875da771719b6dc537ca79fce1" to fix the issue.