Description of problem: It was found that executing bridge snooping code triggered by host originated IGMP packets could cause corruption in 512-byte slabs, most commonly leading to crashes in jbd2. This could be possibly exploited by local unprivileged user to crash the host (DoS).
Upstream commit: http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commitdiff;h=6b0d6a9b4296fa16a28d10d416db7a770fc03287
Statement: This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG as they did not include support for the bridge snooping functionality. A future update in Red Hat Enterprise Linux 6 may address this flaw.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0421 https://rhn.redhat.com/errata/RHSA-2011-0421.html