Hi

On Thu, 14 Nov 2024, Red Hat Product Security wrote:

> 
> Hello!
> 
> INC3151607 ([drivers/md/dm.c] general protection fault in 
> cleanup_mapped_device) has been acknowledged.
> 
> Opened for: [email protected]
> Followers: Alasdair Kergon, [email protected], Mikulas Patocka, 
> [email protected], [email protected], [email protected]
> 
> Rohit Keshri updated your request with the following comments:
> 
> Hello Chenyuan,
>  
> It seems, This is with fault-injection turned on, which is an artificial use 
> case.
>  
> Can this be triggered by a user without that enabled?

No. Normally, small memory allocations don't fail (the kernel will 
activate the OOM killer when it is running out of memory). So, this bug 
can't happen under normal circumstances and you don't need to escalate it 
as a security issue.

> If not, It would be right to send a normal fix for this to the developers for 
> the subsystem

The upstream fix is fed13a5478680614ba97fc87e71f16e2e197912e. You can 
backport it to RHEL.

Mikulas

> Please let us know your thoughts.
>  
> Regards,
> Rohit
> 
> How can I track and update my request?
> 
> To respond, reply to this email. You may also create a new email and 
> include the request number (INC3151607) in the subject.
> 
> Thank you,
> Product Security
> 
>  
> Ref:MSG97709557
> 
> 

Reply via email to