CVE-2009-0935
low-risk
Published 2009-03-18
The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance.
Do I need to act?
-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (2)
Affected Vendors
References (16)
Broken Link
http://www.securityfocus.com/bid/33624
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=488935
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49331
Broken Link
http://www.securityfocus.com/bid/33624
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=488935
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49331
25
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
7/34 · Low