[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] CVE request - kernel: integer overflow in
From: "Steven M. Christey" <coley () linus ! mitre ! org>
Date: 2010-08-16 17:09:55
Message-ID: Pine.GSO.4.64.1008161307540.1035 () faron ! mitre ! org
[Download RAW message or body]
On Mon, 16 Aug 2010, Eugene Teo wrote:
> This was reported by a customer. Integer overflow flaws were found in
> ext4_ext_in_cache() and ext4_ext_get_blocks(). We managed to triggered the
> case in ext4_ext_get_blocks() but did not attempt to try the other. This can
> trigger a BUG() on certain configuration of ext4 file systems.
>
> Upstream commit:
> http://git.kernel.org/linus/731eb1a03a8445cde2cb23ecfb3580c6fa7bb690
>
> https://bugzilla.redhat.com/show_bug.cgi?id=624327
Use CVE-2010-3015
What does an attacker have to do to exploit this? Mount a crafted file
system?
- Steve
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic