The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance.
References
Link | Resource |
---|---|
http://marc.info/?l=linux-kernel&m=123337123501681&w=2 | Mailing List Patch |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.3 | Broken Link |
http://www.openwall.com/lists/oss-security/2009/03/06/2 | Mailing List Patch |
http://www.openwall.com/lists/oss-security/2009/03/18/5 | Mailing List |
http://www.openwall.com/lists/oss-security/2009/03/19/2 | Mailing List |
http://www.securityfocus.com/bid/33624 | Broken Link Patch Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=488935 | Issue Tracking Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49331 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2009-03-18 02:00
Updated : 2024-02-09 00:39
NVD link : CVE-2009-0935
Mitre link : CVE-2009-0935
CVE.ORG link : CVE-2009-0935
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking