Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 16 Aug 2010 10:24:18 +0800
From: Eugene Teo <>
CC: "Steven M. Christey" <>
Subject: CVE request - kernel: integer overflow in ext4_ext_get_blocks()

This was reported by a customer. Integer overflow flaws were found in 
ext4_ext_in_cache() and ext4_ext_get_blocks(). We managed to triggered 
the case in ext4_ext_get_blocks() but did not attempt to try the other. 
This can trigger a BUG() on certain configuration of ext4 file systems.

Upstream commit:

Thanks, Eugene
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ