[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3c54df5e.436a9.19b21b55d21.Coremail.3230100410@zju.edu.cn>
Date: Mon, 15 Dec 2025 19:11:32 +0800 (GMT+08:00)
From: 余昊铖 <3230100410@....edu.cn>
To: "Baokun Li" <libaokun1@...wei.com>
Cc: security@...nel.org, linux-ext4@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: Re: Re: [PATCH] ext4: Fix KASAN use-after-free in ext4_find_extent
Hi,
I have disabled CONFIG_BLK_DEV_WRITE_MOUNTED and spent some time trying to trigger the reported KASAN issues. And I found neither of the two bugs has been observed since. Is this issue still worth investigating?
Thanks,
Haocheng Yu
> Hi,
>
> On 2025-12-09 20:27, 余昊铖 wrote:
> > Hello,
> >
> >
> > I would like to report a potential security issue in the Linux kernel ext4 filesystem, which I found using a modified syzkaller-based kernel fuzzing tool that I developed.
> >
> I noticed that your configuration has CONFIG_BLK_DEV_WRITE_MOUNTED enabled.
>
> This setting allows bare writes to an already mounted ext4 filesystem,
> meaning certain ext4 metadata (like extent tree blocks) can be modified
> without the filesystem being aware of the changes.
>
> Could you please try disabling CONFIG_BLK_DEV_WRITE_MOUNTED and see
> if the issue is still reproducible?
>
>
> Cheers,
> Baokun
Powered by blists - more mailing lists