lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 10 Nov 2008 10:57:35 +0800
From:	Eugene Teo <>
To:	Greg KH <>
	Justin Forbes <>,
	Zwane Mwaikambo <>,
	"Theodore Ts'o" <>,
	Randy Dunlap <>,
	Dave Jones <>,
	Chuck Wolber <>,
	Chris Wedgwood <>,
	Michael Krufky <>,
	Chuck Ebbert <>,
	Domenico Andreoli <>, Willy Tarreau <>,
	Rodrigo Rubira Branco <>,
	Jake Edge <>,,,,
	ext4 development <>,
	Eric Sandeen <>,
	Eugene Teo <>
Subject: Re: [patch 02/16] ext: Avoid printk floods in the face of directory
 corruption (CVE-2008-3528)

Likewise, please change the description to:

"A very large directory with many read failures (either due to storage
problems, or due to invalid size & blocks from corruption) will generate
a printk storm as the filesystem continues to try to read all the
blocks. This flood of messages can tie up the box until it is complete -
which may be a very long time, especially for very large corrupted values.

This is fixed by only reporting the corruption once each time we try to
read the directory."

Thanks, Eugene
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to
More majordomo info at

Powered by blists - more mailing lists