Bug 439918
Summary: | kernel: dio: zero struct dio with kzalloc instead of manually [rhel-5.3] | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Greg Marsden <greg.marsden> | ||||
Component: | kernel | Assignee: | Jeff Moyer <jmoyer> | ||||
Status: | CLOSED ERRATA | QA Contact: | Martin Jenner <mjenner> | ||||
Severity: | high | Docs Contact: | |||||
Priority: | high | ||||||
Version: | 5.3 | CC: | dzickus, esandeen, jpirko, lwang, mjc, qcai, security-response-team, vgoyal | ||||
Target Milestone: | rc | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2009-01-20 19:57:13 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 461082 | ||||||
Attachments: |
|
Description
Greg Marsden
2008-03-31 23:21:14 UTC
Created attachment 299789 [details]
patch to fix dio error path
The upstream patch is http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=848c4dd5153c7a0de55470ce99a8e13a63b4703f Has the bug in question actually been seen on RHEL5? Thanks, -Eric Greg, ping, hve you actually seen this bug on RHEL5? Thanks, -Eric Looking at the RHEL 5 sources, I'd say we're vulnerable. I'll take a closer look and see if I can reproduce the problem. Yeah, I can crash my box with a slightly modified version of the fio job file posted in the upstream bug report. This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. in kernel-2.6.18-103.el5 You can download this test kernel from http://people.redhat.com/dzickus/el5 Oracle, a fix for this bug should be available for testing in the RHEL 5.3 Beta release. You can download these bits from RHN. Please take a moment to verify that the fix is present and functioning as expected and report back your test results as soon as possible. Thanks! Please ping your Red Hat Partner Manager with any additional questions. Removing the CVE name from the synopsis; this is because we have already fixed this issue for Red Hat Enterprise Linux 5 users via an asynchronous security advisory. This bug serves as a placeholder to ensure that the bug was also fixed and tested in the upcoming 5.3 kernel. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2009-0225.html |