4.7 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:N/I:N/A:C
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.1 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device’s event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance.
marc.info/?l=linux-kernel&m=123337123501681&w=2
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.3
www.openwall.com/lists/oss-security/2009/03/06/2
www.openwall.com/lists/oss-security/2009/03/18/5
www.openwall.com/lists/oss-security/2009/03/19/2
www.securityfocus.com/bid/33624
bugzilla.redhat.com/show_bug.cgi?id=488935
exchange.xforce.ibmcloud.com/vulnerabilities/49331
4.7 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:N/I:N/A:C
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.1 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%