CVE-2009-3286

NFSv4 in the Linux kernel 2.6.18, and possibly other versions, does not properly clean up an inode when an O_EXCL create fails, which causes files to be created with insecure settings such as setuid bits, and possibly allows local users to gain privileges, related to the execution of the do_open_permission function even when a create fails.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=81ac95c5
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
http://secunia.com/advisories/37105 Vendor Advisory
http://secunia.com/advisories/38794 Vendor Advisory
http://secunia.com/advisories/38834 Vendor Advisory
http://www.openwall.com/lists/oss-security/2009/09/21/2
http://www.ubuntu.com/usn/USN-852-1
http://www.vupen.com/english/advisories/2010/0528 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=524520
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7527
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9757
https://rhn.redhat.com/errata/RHSA-2009-1548.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=81ac95c5
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
http://secunia.com/advisories/37105 Vendor Advisory
http://secunia.com/advisories/38794 Vendor Advisory
http://secunia.com/advisories/38834 Vendor Advisory
http://www.openwall.com/lists/oss-security/2009/09/21/2
http://www.ubuntu.com/usn/USN-852-1
http://www.vupen.com/english/advisories/2010/0528 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=524520
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7527
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9757
https://rhn.redhat.com/errata/RHSA-2009-1548.html
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*

History

21 Nov 2024, 01:06

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=81ac95c5 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=81ac95c5 -
References () http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html -
References () http://lists.vmware.com/pipermail/security-announce/2010/000082.html - () http://lists.vmware.com/pipermail/security-announce/2010/000082.html -
References () http://secunia.com/advisories/37105 - Vendor Advisory () http://secunia.com/advisories/37105 - Vendor Advisory
References () http://secunia.com/advisories/38794 - Vendor Advisory () http://secunia.com/advisories/38794 - Vendor Advisory
References () http://secunia.com/advisories/38834 - Vendor Advisory () http://secunia.com/advisories/38834 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2009/09/21/2 - () http://www.openwall.com/lists/oss-security/2009/09/21/2 -
References () http://www.ubuntu.com/usn/USN-852-1 - () http://www.ubuntu.com/usn/USN-852-1 -
References () http://www.vupen.com/english/advisories/2010/0528 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/0528 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=524520 - () https://bugzilla.redhat.com/show_bug.cgi?id=524520 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7527 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7527 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9757 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9757 -
References () https://rhn.redhat.com/errata/RHSA-2009-1548.html - () https://rhn.redhat.com/errata/RHSA-2009-1548.html -

07 Nov 2023, 02:04

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=81ac95c5', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=81ac95c5', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=81ac95c5 -

Information

Published : 2009-09-22 10:30

Updated : 2024-11-21 01:06


NVD link : CVE-2009-3286

Mitre link : CVE-2009-3286

CVE.ORG link : CVE-2009-3286


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-264

Permissions, Privileges, and Access Controls