[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request - kernel: integer overflow in
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2010-08-16 17:09:55
Message-ID: Pine.GSO.4.64.1008161307540.1035 () faron ! mitre ! org
[Download RAW message or body]


On Mon, 16 Aug 2010, Eugene Teo wrote:

> This was reported by a customer. Integer overflow flaws were found in 
> ext4_ext_in_cache() and ext4_ext_get_blocks(). We managed to triggered the 
> case in ext4_ext_get_blocks() but did not attempt to try the other. This can 
> trigger a BUG() on certain configuration of ext4 file systems.
>
> Upstream commit:
> http://git.kernel.org/linus/731eb1a03a8445cde2cb23ecfb3580c6fa7bb690
>
> https://bugzilla.redhat.com/show_bug.cgi?id=624327


Use CVE-2010-3015

What does an attacker have to do to exploit this?  Mount a crafted file 
system?

- Steve
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic