The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance.
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/49331 | vdb entry third party advisory |
http://www.securityfocus.com/bid/33624 | patch vdb entry third party advisory broken link |
http://www.openwall.com/lists/oss-security/2009/03/06/2 | mailing list patch |
http://marc.info/?l=linux-kernel&m=123337123501681&w=2 | mailing list patch |
https://bugzilla.redhat.com/show_bug.cgi?id=488935 | issue tracking patch |
http://www.openwall.com/lists/oss-security/2009/03/19/2 | mailing list |
http://www.openwall.com/lists/oss-security/2009/03/18/5 | mailing list |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.3 | broken link |