First published: Sat Nov 13 2010(Updated: )
By submitting certain I/O requests with 0 length, a local user could cause a kernel panic. Proposed patch: <a href="http://git.kernel.org/?p=linux/kernel/git/axboe/linux-2.6-block.git;a=commit;h=9284bcf4e335e5f18a8bc7b26461c33ab60d0689">http://git.kernel.org/?p=linux/kernel/git/axboe/linux-2.6-block.git;a=commit;h=9284bcf4e335e5f18a8bc7b26461c33ab60d0689</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-652957 is considered high due to potential kernel panic caused by zero-length I/O requests.
To fix REDHAT-BUG-652957, you should apply the recommended patch provided by Red Hat.
Local users of the Red Hat Linux kernel are affected by REDHAT-BUG-652957.
REDHAT-BUG-652957 is caused by the submission of certain I/O requests with a length of zero.
As of now, there are no documented workarounds for REDHAT-BUG-652957 other than applying the patch.