Описание
The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance.
Ссылки
- Mailing ListPatch
- Broken Link
- Mailing ListPatch
- Mailing List
- Mailing List
- Broken LinkPatchThird Party AdvisoryVDB Entry
- Issue TrackingPatch
- Third Party AdvisoryVDB Entry
- Mailing ListPatch
- Broken Link
- Mailing ListPatch
- Mailing List
- Mailing List
- Broken LinkPatchThird Party AdvisoryVDB Entry
- Issue TrackingPatch
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Одно из
EPSS
5.5 Medium
CVSS3
4.7 Medium
CVSS2
Дефекты
Связанные уязвимости
The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance.
The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance.
The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6 ...
The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance.
EPSS
5.5 Medium
CVSS3
4.7 Medium
CVSS2