[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE request - kernel: integer overflow in ext4_ext_get_blocks()
From:       Eugene Teo <eugeneteo () kernel ! sg>
Date:       2010-08-16 2:24:18
Message-ID: 4C68A152.7090808 () kernel ! sg
[Download RAW message or body]

This was reported by a customer. Integer overflow flaws were found in 
ext4_ext_in_cache() and ext4_ext_get_blocks(). We managed to triggered 
the case in ext4_ext_get_blocks() but did not attempt to try the other. 
This can trigger a BUG() on certain configuration of ext4 file systems.

Upstream commit:
http://git.kernel.org/linus/731eb1a03a8445cde2cb23ecfb3580c6fa7bb690

https://bugzilla.redhat.com/show_bug.cgi?id=624327

Thanks, Eugene
-- 
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic