CVE-2010-1636

The btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the btrfs functionality in the Linux kernel 2.6.29 through 2.6.32, and possibly other versions, does not ensure that a cloned file descriptor has been opened for reading, which allows local users to read sensitive information from a write-only file descriptor.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*

History

21 Nov 2024, 01:14

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=5dc6416414fb3ec6e2825fd4d20c8bf1d7fe0395 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=5dc6416414fb3ec6e2825fd4d20c8bf1d7fe0395 -
References () http://www.openwall.com/lists/oss-security/2010/05/18/10 - () http://www.openwall.com/lists/oss-security/2010/05/18/10 -
References () http://www.openwall.com/lists/oss-security/2010/05/18/2 - Patch () http://www.openwall.com/lists/oss-security/2010/05/18/2 - Patch
References () http://www.openwall.com/lists/oss-security/2010/05/25/8 - () http://www.openwall.com/lists/oss-security/2010/05/25/8 -
References () https://bugs.launchpad.net/ubuntu/+source/linux/+bug/579585 - Exploit, Patch () https://bugs.launchpad.net/ubuntu/+source/linux/+bug/579585 - Exploit, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=593226 - Exploit () https://bugzilla.redhat.com/show_bug.cgi?id=593226 - Exploit

Information

Published : 2010-06-08 00:30

Updated : 2024-11-21 01:14


NVD link : CVE-2010-1636

Mitre link : CVE-2010-1636

CVE.ORG link : CVE-2010-1636


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor