- Description
- The file watch implementation in the audit subsystem (auditctl -w) in the Red Hat Enterprise Linux (RHEL) 4 kernel 2.6.9 allows local users to cause a denial of service (kernel panic) by replacing a watched file, which does not cause the watch on the old inode to be dropped.
- Source
- secalert@redhat.com
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 4.7
- Impact score
- 6.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:N/I:N/A:C
- Hype score
- Not currently trending
- Comment
- -
- Impact
- Successful exploitation requires that the attacker previously created a watch for a file.
- Solution
- Successful exploitation requires that the attacker previously created a watch for a file.
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4A4A962F-3512-40C5-8860-F3212E441494"
}
],
"operator": "OR"
}
]
}
]