CWE
476
Advisory Published
Updated

REDHAT-BUG-529227: Null Pointer Dereference

First published: Thu Oct 15 2009(Updated: )

Hi, Description of problem: execution of a particular program from the Arachne suite reliably causes a kernel panic due to a NULL-pointer dereference in nfs4_proc_lock(). Version-Release number of selected component (if applicable): 2.6.18-164.2.1.el5 How reproducible: always on NFSv4 mounted directories Steps to Reproduce: 1. wget <a href="http://www.genoscope.cns.fr/externe/redhat/XMLMissingField">http://www.genoscope.cns.fr/externe/redhat/XMLMissingField</a> 2. Save a copy on an NFSv4-mounted directory 3. Execute it Actual results: Kernel panic Expected results: No panic Additional info: Console output: Unable to handle kernel NULL pointer dereference at 0000000000000030 RIP: [&lt;ffffffff8837b210&gt;] :nfs:nfs4_proc_lock+0x21f/0x3ad PGD 1026eec067 PUD 1026f2f067 PMD 0 Oops: 0000 [1] SMP last sysfs file: /block/dm-1/range CPU 0 Modules linked in: ipmi_devintf ipmi_si ipmi_msghandler nfs lockd fscache nfs_acl sunrpc bonding ipv6 xfrm_nalgo crypto_api video hwmon backlight sbs i2c_ec button battery asus_acpi acpi_memhotplug ac joydev sg shpchp i2c_nforce2 i2c_core forcedeth dm_snapshot dm_zero dm_mod sata_nv libata mptsas mptscsih mptbase scsi_transport_sas sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd Pid: 4070, comm: XMLMissingField Not tainted 2.6.18-164.2.1.el5 #1 RIP: 0010:[&lt;ffffffff8837b210&gt;] [&lt;ffffffff8837b210&gt;] :nfs:nfs4_proc_lock+0x21f/0x3ad RSP: 0018:ffff810819bdbdd8 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff810827c52088 RSI: 0000000000000006 RDI: ffff810819bdbe38 RBP: ffff81081a6dfdc0 R08: 0000000000000001 R09: ffff810819bdbd68 R10: ffff810819bdbd68 R11: 00000000000000d0 R12: ffff810827c52088 R13: 0000000000000000 R14: ffff810819a9b930 R15: 0000000000000006 FS: 00002b97d31fc7b0(0000) GS:ffffffff803c1000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b CR2: 0000000000000030 CR3: 00000010268cb000 CR4: 00000000000006e0 Process XMLMissingField (pid: 4070, threadinfo ffff810819bda000, task ffff810827d6a7e0) Stack: 00000000000003e8 0000000000000000 ffff810819a9b930 ffffffff88373e4f 0000000000000000 0000000000000000 0000000000000000 0000000019a9ba40 ffff810819bdbe18 ffff810819bdbe18 0000000000000000 0000000000000000 Call Trace: [&lt;ffffffff88373e4f&gt;] :nfs:nfs_sync_inode_wait+0x116/0x1db [&lt;ffffffff8836a226&gt;] :nfs:do_setlk+0x55/0x8c [&lt;ffffffff80039e72&gt;] fcntl_setlk+0x11e/0x273 [&lt;ffffffff800b66fa&gt;] audit_syscall_entry+0x180/0x1b3 [&lt;ffffffff8002e5bb&gt;] sys_fcntl+0x269/0x2dc [&lt;ffffffff8005d28d&gt;] tracesys+0xd5/0xe0 Code: 49 8b 45 30 4c 89 e6 4c 89 ef 45 8a 74 24 58 48 8b 40 18 48 RIP [&lt;ffffffff8837b210&gt;] :nfs:nfs4_proc_lock+0x21f/0x3ad RSP &lt;ffff810819bdbdd8&gt; CR2: 0000000000000030 &lt;0&gt;Kernel panic - not syncing: Fatal exception Also see <a href="http://www.spinics.net/linux/lists/linux-nfs/msg03357.html">http://www.spinics.net/linux/lists/linux-nfs/msg03357.html</a>

Affected SoftwareAffected VersionHow to fix
Red Hat Linux=2.6.18-164.2.1.el5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of REDHAT-BUG-529227?

    The severity of REDHAT-BUG-529227 is critical due to its ability to cause kernel panic.

  • How do I fix REDHAT-BUG-529227?

    To fix REDHAT-BUG-529227, it is recommended to update to the latest kernel version that addresses this issue.

  • What impact does REDHAT-BUG-529227 have on system performance?

    REDHAT-BUG-529227 can lead to system instability and crashes, significantly impacting performance due to kernel panic.

  • Which versions are affected by REDHAT-BUG-529227?

    REDHAT-BUG-529227 specifically affects the Red Hat Linux Kernel version 2.6.18-164.2.1.el5.

  • How can I reproduce the issue in REDHAT-BUG-529227?

    The issue in REDHAT-BUG-529227 can be consistently reproduced by executing a particular program from the Arachne suite on an NFSv4 mounted file system.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203