kernel is vulnerable to denial of service (DoS). The vulnerability exists as a flaw was found in the way space was allocated in the Linux kernel’s Global File System 2 (GFS2) implementation. If the file system was almost full, and a local, unprivileged user made an fallocate() request, it could result in a denial of service. Note: Setting quotas to prevent users from using all available disk space would prevent exploitation of this flaw.
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6905d9e4dda6112f007e9090bca80507da158e63
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6905d9e4dda6112f007e9090bca80507da158e63
marc.info/?l=bugtraq&m=139447903326211&w=2
rhn.redhat.com/errata/RHSA-2011-1065.html
secunia.com/advisories/45193
securitytracker.com/id?1025776
www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc1
www.openwall.com/lists/oss-security/2011/07/13/1
www.securityfocus.com/bid/48677
access.redhat.com/errata/RHSA-2011:1065
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=720861
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1065
exchange.xforce.ibmcloud.com/vulnerabilities/68557