First published: Mon Nov 21 2011(Updated: )
On a corrupted file system the ->len field could be wrong leading to a buffer overflow. <a href="https://lkml.org/lkml/2011/11/9/303">https://lkml.org/lkml/2011/11/9/303</a> Upstream commit: <a href="http://git.kernel.org/linus/bc5b8a9003132ae44559edd63a1623">http://git.kernel.org/linus/bc5b8a9003132ae44559edd63a1623</a> Acknowledgements: Red Hat would like to thank Clement Lecigne for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-755431 is high due to the potential for a buffer overflow that can lead to system compromise.
To fix REDHAT-BUG-755431, apply the latest security updates and patches provided by Red Hat for the Linux kernel.
REDHAT-BUG-755431 affects versions of the Red Hat Linux kernel that are susceptible to filesystem corruption issues.
The vulnerability in REDHAT-BUG-755431 is caused by a corrupted file system leading to inaccuracies in the '->len' field, resulting in a buffer overflow.
Currently, the best course of action for REDHAT-BUG-755431 is to ensure your system is up to date with the latest patches from Red Hat.