Updated:
Description:
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() Unlike other strings in the ext4 superblock, we rely on tune2fs to make sure s_mount_opts is NUL terminated. Harden parse_apply_sb_mount_options() by treating s_mount_opts as a potential __nonstring.
CVSS3: 5.5
| OS | Vendor version | Errata |
|---|---|---|
| Oracle Linux 8 UEK 6 | 5.4.17-2136.350.3.1.el8uek | ELSA-2025-28049 |
| Debian 11 | 5.10.247-1 | DLA-4404-1 |
| Debian 11 cloud | 5.10.247-1 | DLA-4404-1 |
| Amazon Linux 2023 | 6.1.158-178.288.amzn2023 | ALAS2023-2025-1297 |
| OS | Original kernel version | State |
|---|---|---|
| Oracle Linux 8 UEK 6 | |
Planned |
| Debian 11 | |
Planned |
| Debian 11 cloud | |
Planned |
| Amazon Linux 2023 | |
Planned |