First published: Mon Jun 08 2009(Updated: )
The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =2.6.27.12 | |
Linux Linux kernel | =2.6.29-rc8-kk | |
Linux Linux kernel | =2.6.27.3 | |
Linux Linux kernel | =2.6.29.3 | |
Linux Linux kernel | =2.6.27.1 | |
Linux Linux kernel | =2.6.27.18 | |
Linux Linux kernel | =2.6.27.21 | |
Linux Linux kernel | =2.6.30-rc2 | |
Linux Linux kernel | =2.6.27.10 | |
Linux Linux kernel | =2.6.27.17 | |
Linux Linux kernel | =2.6.27.16 | |
Linux Linux kernel | =2.6.27.20 | |
Linux Linux kernel | =2.6.27.4 | |
Linux Linux kernel | =2.6.27.13 | |
Linux Linux kernel | =2.6.27.15 | |
Linux Linux kernel | =2.6.27.19 | |
Linux Linux kernel | =2.6.27.22 | |
Linux Linux kernel | =2.6.29-rc2_git7 | |
Linux Linux kernel | =2.6.29.rc1 | |
Linux Linux kernel | =2.6.27.2 | |
Linux Linux kernel | =2.6.27.11 | |
Linux Linux kernel | =2.6.29.rc2 | |
Linux Linux kernel | =2.6.29.rc2-git1 | |
Linux Linux kernel | =2.6.30-rc1 | |
Linux Linux kernel | =2.6.29-git1 | |
Linux Linux kernel | =2.6.27.23 | |
Linux Linux kernel | =2.6.27.14 | |
Linux Linux kernel | <=2.6.19 | |
Linux Linux kernel | >=2.6.27<2.6.27.24 | |
Linux Linux kernel | >=2.6.29<2.6.29.4 | |
Debian Debian Linux | =4.0 | |
Canonical Ubuntu Linux | =6.06 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =8.10 | |
Canonical Ubuntu Linux | =9.04 | |
openSUSE openSUSE | =10.3 | |
openSUSE openSUSE | =11.1 | |
SUSE Linux Enterprise | =11.0 | |
SUSE Linux Enterprise Desktop | =11 | |
SUSE Linux Enterprise Server | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.