First published: Tue May 18 2010(Updated: )
Description of problem: The existing [btrfs] code would have allowed you to clone a file that was only open for writing. Not an expected behaviour. Upstream commit: <a href="http://git.kernel.org/linus/5dc6416414fb3ec6e2825fd4d20c8bf1d7fe0395">http://git.kernel.org/linus/5dc6416414fb3ec6e2825fd4d20c8bf1d7fe0395</a> Reference: <a href="https://btrfs.wiki.kernel.org/index.php/Main_Page">https://btrfs.wiki.kernel.org/index.php/Main_Page</a> The kernel in Red Hat Enterprise Linux 6 has support for Btrfs by default. Acknowledgements: Red Hat would like to thank Dan Rosenberg for responsibly reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | ||
btrfs-progs |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-593226 is considered moderate as it allows unexpected file cloning behavior.
To fix REDHAT-BUG-593226, it is recommended to apply the latest updates from Red Hat and ensure you are using an updated version of btrfs.
REDHAT-BUG-593226 affects Red Hat Enterprise Linux 6 and components using the Btrfs file system.
REDHAT-BUG-593226 describes an issue where the Btrfs code allows cloning of files that are only open for writing.
There is currently no official workaround for REDHAT-BUG-593226, so updating to the fix is the best approach.