On Wed, 03 Dec 2008 14:40:56 +0100, Secunia Research <vuln at secunia.com> wrote: > The added "i_index_count > ( 0xffffffff / sizeof( rm_index_t ) )" check > is insufficient, allowing values of 0x15555555 to trigger the overflow. We know that. This was fixed yesterday in the git repository. -- Rémi Denis-Courmont