The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.Referenceshttp://www.openwall.com/lists/oss-security/2015/06/02/7http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.htmlhttps://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58https://bugzilla.redhat.com/show_bug.cgi?id=1228229http://www.securityfocus.com/bid/74964http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.htmlhttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html