Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 488935 - (CVE-2009-0935) CVE-2009-0935 kernel: inotify local DoS
CVE-2009-0935 kernel: inotify local DoS
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
public=20090122,source=lkml,reported=...
: Security
Depends On: 489259 489260 489261
Blocks:
  Show dependency treegraph
 
Reported: 2009-03-06 04:29 EST by Eugene Teo (Security Response)
Modified: 2018-10-19 21:52 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2009-05-14 21:37:39 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Upstream patch (5.59 KB, patch)
2009-03-06 04:58 EST, Eugene Teo (Security Response)
no flags Details | Diff

  None (edit)
Description Eugene Teo (Security Response) 2009-03-06 04:29:11 EST
Description of problem:
If userspace supplies an invalid pointer to a read() of an inotify instance, the inotify device's event list mutex is unlocked twice. This causes an unbalance which effectively leaves the data structure unprotected, and we can trigger oopses by accessing the inotify instance from different tasks concurrently.

http://patchwork.kernel.org/patch/4857/
Comment 17 Eugene Teo (Security Response) 2009-03-19 00:18:18 EDT
CVSS2 score of medium, 4.7 (AV:L/AC:M/Au:N/C:N/I:N/A:C)

Note You need to log in before you can comment on or make changes to this bug.