Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 06 Mar 2009 22:10:39 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: inotify local DoS

According to the upstream commit 3632dee2, if userspace supplies an 
invalid pointer to a read() of an inotify instance, the inotify device's 
event list mutex is unlocked twice. This causes an unbalance which 
effectively leaves the data structure unprotected, and we can trigger 
oopses by accessing the inotify instance from different tasks
concurrently.

http://patchwork.kernel.org/patch/4857/
https://bugzilla.redhat.com/show_bug.cgi?id=488935

Thanks, Eugene
-- 
Eugene Teo / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.