The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device’s event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance.
CPE | Name | Operator | Version |
---|---|---|---|
linux_kernel | eq | 2.6.29 rc3 | |
linux_kernel | ge | 2.6.28 | |
linux_kernel | le | 2.6.28.2 | |
linux_kernel | ge | 2.6.27 | |
linux_kernel | le | 2.6.27.13 |
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.3
www.openwall.com/lists/oss-security/2009/03/06/2
www.openwall.com/lists/oss-security/2009/03/18/5
www.openwall.com/lists/oss-security/2009/03/19/2
www.securityfocus.com/bid/33624
bugzilla.redhat.com/show_bug.cgi?id=488935
exchange.xforce.ibmcloud.com/vulnerabilities/49331
marc.info/?l=linux-kernel&m=123337123501681&w=2