First published: Tue Feb 16 2016(Updated: )
It was reported that attempt to move page mapped by aio ring buffer to other node triggers NULL pointer dereference at trace_writeback_dirty_page(), because aio_fs_backing_dev_info.dev is 0. Product bug (contains reproducer): <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1306851">https://bugzilla.redhat.com/show_bug.cgi?id=1306851</a> Upstream patch: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=42cb14b110a5698ccf26ce59c4441722605a3743">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=42cb14b110a5698ccf26ce59c4441722605a3743</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1308846 is categorized as a severe bug due to the potential for a NULL pointer dereference leading to system instability.
REDHAT-BUG-1308846 affects the Red Hat Linux Kernel.
To resolve REDHAT-BUG-1308846, it is recommended to apply the latest patches provided by Red Hat for the Linux Kernel.
The symptoms of REDHAT-BUG-1308846 may include system crashes or unexpected behavior when performing specific operations with asynchronous I/O.
While there is no official workaround for REDHAT-BUG-1308846, minimizing or avoiding the use of the affected asynchronous I/O features may reduce instability.