First published: Tue Mar 29 2011(Updated: )
Originally, the <a href="https://access.redhat.com/security/cve/CVE-2010-4250">CVE-2010-4250</a> identifier has been assigned to the following vulnerability: Memory leak in the inotify_init() system call could, in some cases, leak a group, allowing a local, unprivileged user to eventually cause a denial of service. References: [1] <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4250">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4250</a> Later, it was found that relevant upstream commit: a2ae4cc9a16e211c8a128ba10d22a85431f093ab, v2.6.37-rc5 did not properly address the issue / introduced a regression (slab corruption by double free of user_struct in inotify_init1), which could allow a local, unprivileged user to cause a denial of service (kernel crash).
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | >=2.6.37-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-691793 is considered a medium severity vulnerability due to its potential for memory leak exploitation leading to denial of service.
To fix REDHAT-BUG-691793, update the Red Hat Linux Kernel to a version that has addressed the memory leak issue.
Systems running Red Hat Linux Kernel versions 2.6.37-rc5 and later are affected by the REDHAT-BUG-691793 vulnerability.
The potential impacts of REDHAT-BUG-691793 include resource exhaustion and possible denial of service conditions for unprivileged users.
Currently, there are no effective workarounds for REDHAT-BUG-691793, and upgrading the kernel is the recommended solution.