[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] CVE request - kernel: integer overflow in ext4_ext_get_blocks()
From: Eugene Teo <eugene () redhat ! com>
Date: 2010-08-17 3:37:20
Message-ID: 4C6A03F0.8020003 () redhat ! com
[Download RAW message or body]
> Use CVE-2010-3015
>
> What does an attacker have to do to exploit this? Mount a crafted file
> system?
To trigger this, the attacker needs to write to the last block of a file
(of max file size) and sync it.
Thanks, Eugene
--
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic