| The Linux kernel is vulnerable to out-of-bounds access when handling corrupted ISO file system (ISOFS) images. Specifically, the `isofs_read_inode()` function can read data beyond the end of a buffer when processing a corrupted ISOFS image. This occurs because the directory entry length is not properly sanity-checked before use. |
| |
| To exploit this vulnerability, an attacker would need to craft a specially corrupted ISOFS image that triggers the out-of-bounds access. The impact of this vulnerability could be arbitrary code execution or denial-of-service attacks. |
| |
| The fix for this issue involves adding a sanity check on the directory entry length in `isofs_read_inode()` to prevent out-of-bounds access. This fix has been applied to various Linux kernel versions, including 4.4.292, 4.9.290, 4.14.255, and others. Users are advised to update to the latest stable kernel version to resolve this issue. |
| |