Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4C68A152.7090808@kernel.sg>
Date: Mon, 16 Aug 2010 10:24:18 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request - kernel: integer overflow in ext4_ext_get_blocks()

This was reported by a customer. Integer overflow flaws were found in 
ext4_ext_in_cache() and ext4_ext_get_blocks(). We managed to triggered 
the case in ext4_ext_get_blocks() but did not attempt to try the other. 
This can trigger a BUG() on certain configuration of ext4 file systems.

Upstream commit:
http://git.kernel.org/linus/731eb1a03a8445cde2cb23ecfb3580c6fa7bb690

https://bugzilla.redhat.com/show_bug.cgi?id=624327

Thanks, Eugene
-- 
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.