[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE request - kernel: integer overflow in ext4_ext_get_blocks()
From: Eugene Teo <eugeneteo () kernel ! sg>
Date: 2010-08-16 2:24:18
Message-ID: 4C68A152.7090808 () kernel ! sg
[Download RAW message or body]
This was reported by a customer. Integer overflow flaws were found in
ext4_ext_in_cache() and ext4_ext_get_blocks(). We managed to triggered
the case in ext4_ext_get_blocks() but did not attempt to try the other.
This can trigger a BUG() on certain configuration of ext4 file systems.
Upstream commit:
http://git.kernel.org/linus/731eb1a03a8445cde2cb23ecfb3580c6fa7bb690
https://bugzilla.redhat.com/show_bug.cgi?id=624327
Thanks, Eugene
--
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic