Bug 642746 - RHEL4.8 panic in netif_receive_skb [rhel-4.8.z]
Summary: RHEL4.8 panic in netif_receive_skb [rhel-4.8.z]
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: kernel
Version: 4.8
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: rc
: ---
Assignee: Don Howard
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard:
Depends On: 616710
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-10-13 18:19 UTC by RHEL Program Management
Modified: 2018-10-27 11:36 UTC (History)
13 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Erroneous pointer checks could have caused a kernel panic. This was due to a critical value not being copied when a network buffer was duplicated and consumed by multiple portions of the kernel's network stack. Fixing the copy operation resolved this bug.
Clone Of:
Environment:
Last Closed: 2010-12-01 22:24:54 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0936 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2010-12-06 14:19:04 UTC

Description RHEL Program Management 2010-10-13 18:19:22 UTC
This bug has been copied from bug #616710 and has been proposed
to be backported to 4.8 z-stream (EUS).

Comment 6 Don Howard 2010-11-05 18:43:21 UTC
A patch addressing this issue has been included in kernel-2.6.9-89.32.1.

Comment 10 errata-xmlrpc 2010-12-01 22:24:54 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2010-0936.html

Comment 11 Douglas Silas 2011-01-30 22:27:32 UTC
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
Erroneous pointer checks could have caused a kernel panic. This was due to a critical value not being copied when a network buffer was duplicated and consumed by multiple portions of the kernel's network stack. Fixing the copy operation resolved this bug.


Note You need to log in before you can comment on or make changes to this bug.