lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <174775151761.432196.4462280436120329643.b4-ty@mit.edu> Date: Tue, 20 May 2025 10:40:12 -0400 From: "Theodore Ts'o" <tytso@....edu> To: Andreas Dilger <adilger.kernel@...ger.ca>, Tao Ma <boyu.mt@...bao.com>, Jan Kara <jack@...e.com>, Thadeu Lima de Souza Cascardo <cascardo@...lia.com> Cc: "Theodore Ts'o" <tytso@....edu>, linux-ext4@...r.kernel.org, linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org, kernel-dev@...lia.com, syzbot+fe2a25dae02a207717a0@...kaller.appspotmail.com, stable@...r.kernel.org Subject: Re: [PATCH] ext4: inline: fix len overflow in ext4_prepare_inline_data On Tue, 15 Apr 2025 11:53:04 -0300, Thadeu Lima de Souza Cascardo wrote: > When running the following code on an ext4 filesystem with inline_data > feature enabled, it will lead to the bug below. > > fd = open("file1", O_RDWR | O_CREAT | O_TRUNC, 0666); > ftruncate(fd, 30); > pwrite(fd, "a", 1, (1UL << 40) + 5UL); > > [...] Applied, thanks! [1/1] ext4: inline: fix len overflow in ext4_prepare_inline_data commit: 227cb4ca5a6502164f850d22aec3104d7888b270 Best regards, -- Theodore Ts'o <tytso@....edu>
Powered by blists - more mailing lists