plymouth-pretrigger.sh in dracut and udev, when running on Fedora 13 and 14, sets weak permissions for the /dev/systty device file, which allows remote authenticated users to read terminal data from tty0 for local users.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051755.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051418.html - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/42342 - Not Applicable | |
References | () http://secunia.com/advisories/42451 - Not Applicable | |
References | () http://www.securityfocus.com/bid/45046 - Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2010/3062 - Permissions Required | |
References | () http://www.vupen.com/english/advisories/2010/3110 - Permissions Required | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=654489 - Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=654935 - Issue Tracking, Third Party Advisory |
03 Jun 2022, 15:09
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-276 | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051418.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=654489 - Issue Tracking, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/42342 - Not Applicable | |
References | (BID) http://www.securityfocus.com/bid/45046 - Third Party Advisory, VDB Entry | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051755.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=654935 - Issue Tracking, Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/3062 - Permissions Required | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/3110 - Permissions Required | |
References | (SECUNIA) http://secunia.com/advisories/42451 - Not Applicable | |
CPE | cpe:2.3:a:kernel:udev:0.9.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.1.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.4.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.7.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.6.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.2.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.9.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.2.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.2.1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.1.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.2.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:fedora:14:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.1.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.1.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.2.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.6.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.5.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.2.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.1.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.1.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.4.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.9.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.8.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.3.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.8.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.1.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.7.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.2.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.6.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.9.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.8.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.1.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.2.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.3.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.3.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.1.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.3.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.5.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.4.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.3.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.1.1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.6.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.1.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.0.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.6.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.4.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.5.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.4.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.6.1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.0.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.2.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.3.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.1.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.2.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.9.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.4.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.5.1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.0.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.3.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.8.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:fedora:13:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.7.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.8.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.3.1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.2.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.2.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.0.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.4.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.2.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.8.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.4.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.9.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.5.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.1.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.6.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.3.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.1.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.5.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.2.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.0.1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.3.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.7.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.1.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.3.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.1.1-1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.8.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.5.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.2.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.4.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.3.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.6.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.9-1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.5.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.3.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.3:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.2.6:*:*:*:*:*:*:* cpe:2.3:a:fedoraproject:dracut:*:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.5-1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.2.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.7.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.7.1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.6.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.2.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.3.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.6.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.3.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.7.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.5.6:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.8.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.4-1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.7.7:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.1.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.7.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.0.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.4.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.9.1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.5.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.1.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.3.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.8.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.7.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.0.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.2.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.0.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.9.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.9.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.0.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.1.0-1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.1.8:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.3.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.8.1:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.4:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:1.3.9:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.9.5:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.3.2:*:*:*:*:*:*:* cpe:2.3:a:kernel:udev:0.0.8-1:*:*:*:*:*:*:* |
cpe:2.3:a:udev_project:udev:-:*:*:*:*:*:*:* cpe:2.3:a:dracut_project:dracut:-:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* |
Information
Published : 2010-12-07 22:00
Updated : 2024-11-21 01:20
NVD link : CVE-2010-4176
Mitre link : CVE-2010-4176
CVE.ORG link : CVE-2010-4176
JSON object : View
Products Affected
dracut_project
- dracut
udev_project
- udev
fedoraproject
- fedora
CWE
CWE-276
Incorrect Default Permissions