The do_coredump function in fs/exec.c in the Linux kernel 2.6.19 sets the flag variable to O_EXCL but does not use it, which allows context-dependent attackers to modify arbitrary files via a rewrite attack during a core dump.
References
Configurations
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/23349 - Vendor Advisory | |
References | () http://support.avaya.com/css/P8/documents/100073666 - | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.1 - | |
References | () http://www.securityfocus.com/bid/21591 - Patch | |
References | () http://www.trustix.org/errata/2006/0074/ - | |
References | () http://www.vupen.com/english/advisories/2006/5002 - Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10797 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7446 - | |
References | () https://rhn.redhat.com/errata/RHSA-2010-0046.html - | |
References | () https://rhn.redhat.com/errata/RHSA-2010-0095.html - |
Information
Published : 2006-12-14 20:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6304
Mitre link : CVE-2006-6304
CVE.ORG link : CVE-2006-6304
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-399
Resource Management Errors