Bug 642746

Summary: RHEL4.8 panic in netif_receive_skb [rhel-4.8.z]
Product: Red Hat Enterprise Linux 4 Reporter: RHEL Program Management <pm-rhel>
Component: kernelAssignee: Don Howard <dhoward>
Status: CLOSED ERRATA QA Contact: Red Hat Kernel QE team <kernel-qe>
Severity: urgent Docs Contact:
Priority: urgent    
Version: 4.8CC: agospoda, dhoward, dwu, jolsa, jpirko, moshiro, nhorman, pep, pm-eus, tao, tgraf, xwang, yugzhang
Target Milestone: rcKeywords: Regression, ZStream
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Erroneous pointer checks could have caused a kernel panic. This was due to a critical value not being copied when a network buffer was duplicated and consumed by multiple portions of the kernel's network stack. Fixing the copy operation resolved this bug.
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-12-01 22:24:54 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 616710    
Bug Blocks:    

Description RHEL Program Management 2010-10-13 18:19:22 UTC
This bug has been copied from bug #616710 and has been proposed
to be backported to 4.8 z-stream (EUS).

Comment 6 Don Howard 2010-11-05 18:43:21 UTC
A patch addressing this issue has been included in kernel-2.6.9-89.32.1.

Comment 10 errata-xmlrpc 2010-12-01 22:24:54 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2010-0936.html

Comment 11 Douglas Silas 2011-01-30 22:27:32 UTC
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
Erroneous pointer checks could have caused a kernel panic. This was due to a critical value not being copied when a network buffer was duplicated and consumed by multiple portions of the kernel's network stack. Fixing the copy operation resolved this bug.