The xfs_swapext function in fs/xfs/xfs_dfrag.c in the Linux kernel before 2.6.35 does not properly check the file descriptors passed to the SWAPEXT ioctl, which allows local users to leverage write access and obtain read access by swapping one file into another file.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.free.net.ph/message/20100616.130710.301704aa.en.html - Broken Link | |
References | () http://archives.free.net.ph/message/20100616.135735.40f53a32.en.html - Broken Link | |
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1817176a86352f65210139d4c794ad2d19fc6b63 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=oss-security&m=127677135609357&w=2 - Third Party Advisory | |
References | () http://marc.info/?l=oss-security&m=127687486331790&w=2 - Third Party Advisory | |
References | () http://secunia.com/advisories/43315 - Third Party Advisory | |
References | () http://www.debian.org/security/2010/dsa-2094 - Third Party Advisory | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35 - Broken Link | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0610.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/516397/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/40920 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1000-1 - Third Party Advisory | |
References | () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2011/0298 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=605158 - Issue Tracking, Third Party Advisory |
Information
Published : 2010-09-03 20:00
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2226
Mitre link : CVE-2010-2226
CVE.ORG link : CVE-2010-2226
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
suse
- linux_enterprise_server
- linux_enterprise_software_development_kit
- linux_enterprise_desktop
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor