A potential data corruption vulnerability has been identified in the Red Hat Linux kernel. The potential issue may be exploitable under very restrictive circumstances. It has been reported in these restrictive circumstance a file may be simultaneously unlinked and the corresponding mapped file blocks reallocated. If an attacker can recreate the necessary environment, it may be possible to create a condition where arbitrary files are corrupted.
A potential data corruption vulnerability has been identified in the Red Hat Linux kernel. The potential issue may be exploitable under very restrictive circumstances. It has been reported in these restrictive circumstance a file may be simultaneously unlinked and the corresponding mapped file blocks reallocated. If an attacker can recreate the necessary environment, it may be possible to create a condition where arbitrary files are corrupted.