A flaw was found in the way Linux kernel's XFS filesystem implementation handled links with pathname larger than MAXPATHLEN. When CONFIG_XFS_DEBUG configuration option was not enabled when compiling Linux kernel, an attacker able to mount malicious XFS image could use this flaw to crash the system, or potentially, elevate his privileges on that system. Proposed upstream patch: http://oss.sgi.com/archives/xfs/2011-10/msg00345.html
Statement: This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not include support for XFS filesystem. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2012-0007.html, https://rhn.redhat.com/errata/RHSA-2012-0350.html, and https://rhn.redhat.com/errata/RHSA-2012-0333.html.
Created kernel tracking bugs for this issue Affects: fedora-all [bug 749166]
http://oss.sgi.com/cgi-bin/gitweb.cgi?p=xfs/xfs.git;a=commitdiff;h=b52a360b2aa1c59ba9970fb0f52bbb093fcc7a24
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2012:0007 https://rhn.redhat.com/errata/RHSA-2012-0007.html
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2012:0333 https://rhn.redhat.com/errata/RHSA-2012-0333.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:0350 https://rhn.redhat.com/errata/RHSA-2012-0350.html