oss-sec mailing list archives
Re: CVE request - kernel: integer overflow in ext4_ext_get_blocks()
From: Eugene Teo <eugene () redhat com>
Date: Tue, 17 Aug 2010 11:37:20 +0800
Use CVE-2010-3015 What does an attacker have to do to exploit this? Mount a crafted file system?
To trigger this, the attacker needs to write to the last block of a file (of max file size) and sync it.
Thanks, Eugene -- main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
Current thread:
- CVE request - kernel: integer overflow in ext4_ext_get_blocks() Eugene Teo (Aug 15)
- Re: CVE request - kernel: integer overflow in ext4_ext_get_blocks() Steven M. Christey (Aug 16)
- Re: CVE request - kernel: integer overflow in ext4_ext_get_blocks() Eugene Teo (Aug 16)
- Re: CVE request - kernel: integer overflow in ext4_ext_get_blocks() Steven M. Christey (Aug 16)