| Summary: | NFS kernel panic with port port or security scan on nfs mounts | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | John Ferreira <ferreira> |
| Component: | kernel | Assignee: | nfs-maint |
| Status: | CLOSED INSUFFICIENT_DATA | QA Contact: | Red Hat Kernel QE team <kernel-qe> |
| Severity: | high | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 6.3 | CC: | eteo, jlayton, rwheeler, sprabhu, steved, syeghiay |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2012-01-11 13:20:17 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
|
Description
John Ferreira
2011-02-07 23:41:13 UTC
Please post the panic info... Could you please test this particular issue using the kernel from http://rhn.redhat.com/errata/RHSA-2011-0329.html This fixes an error handling code which resulted in a similar crash. -- * A use-after-free flaw was found in the Linux kernel's RPC server sockets implementation. A remote attacker could use this flaw to trigger a denial of service by sending a corrupted packet to a target system. (CVE-2011-0714, Important) -- Since RHEL 6.1 External Beta has begun, and this bug remains unresolved, it has been rejected as it is not proposed as exception or blocker. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. No response to the inquiry... Changing the component to kernel and moving out to 6.3 Since RHEL 6.2 External Beta has begun, and this bug remains unresolved, it has been rejected as it is not proposed as exception or blocker. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. This is probably the same issue described in https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-0714 |