The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/?p=linux/kernel/git/tytso/ext4.git%3Ba=commit%3Bh=4a58579b9e4e2a35d57e6c9c8483e52f6f1b7fd6Â - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html - | |
References | () http://lkml.org/lkml/2009/12/9/255Â - Patch | |
References | () http://secunia.com/advisories/37658Â - Vendor Advisory | |
References | () http://secunia.com/advisories/37686Â - | |
References | () http://secunia.com/advisories/38017Â - | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.32-git6.log - Patch | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:329Â - | |
References | () http://www.securityfocus.com/bid/37277Â - Patch | |
References | () http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/Â - | |
References | () http://www.ubuntu.com/usn/USN-869-1Â - | |
References | () http://www.vupen.com/english/advisories/2009/3468Â - Patch, Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=544471Â - Patch | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00702.html - |
Information
Published : 2009-12-13 01:30
Updated : 2024-11-21 01:08
NVD link : CVE-2009-4131
Mitre link : CVE-2009-4131
CVE.ORG link : CVE-2009-4131
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-264
Permissions, Privileges, and Access Controls