First published: Mon Feb 15 2010(Updated: )
The futex_lock_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly manage a certain reference count, which allows local users to cause a denial of service (OOPS) via vectors involving an unmount of an ext3 filesystem.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <2.6.33 | |
Linux Kernel | =2.6.33 | |
Linux Kernel | =2.6.33-rc1 | |
Linux Kernel | =2.6.33-rc2 | |
Linux Kernel | =2.6.33-rc3 | |
Linux Kernel | =2.6.33-rc4 | |
Linux Kernel | =2.6.33-rc5 | |
Linux Kernel | =2.6.33-rc6 | |
SUSE Linux | =11.2 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0623 has been classified as a high-severity vulnerability that can lead to a denial of service.
To fix CVE-2010-0623, upgrade the Linux kernel to version 2.6.33 or later.
CVE-2010-0623 affects Linux kernel versions prior to 2.6.33 and specific release candidates of 2.6.33.
CVE-2010-0623 enables local users to cause a denial of service that results in kernel crashes.
CVE-2010-0623 is present in various Linux distributions that use the affected kernel versions, including Ubuntu and openSUSE.