[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 16 Aug 2010 10:24:18 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request - kernel: integer overflow in ext4_ext_get_blocks()
This was reported by a customer. Integer overflow flaws were found in
ext4_ext_in_cache() and ext4_ext_get_blocks(). We managed to triggered
the case in ext4_ext_get_blocks() but did not attempt to try the other.
This can trigger a BUG() on certain configuration of ext4 file systems.
Upstream commit:
http://git.kernel.org/linus/731eb1a03a8445cde2cb23ecfb3580c6fa7bb690
https://bugzilla.redhat.com/show_bug.cgi?id=624327
Thanks, Eugene
--
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
Powered by blists - more mailing lists
Please check out the
Open Source Software Security Wiki, which is counterpart to this
mailing list.
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ