CVE-2014-9710

The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time window, related to a race condition, or (2) after an xattr-replacement attempt that fails because the data does not fit.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:21

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 - Broken Link, Vendor Advisory () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 - Broken Link, Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/03/24/11 - Mailing List () http://www.openwall.com/lists/oss-security/2015/03/24/11 - Mailing List
References () http://www.securitytracker.com/id/1032418 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1032418 - Broken Link, Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1205079 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1205079 - Issue Tracking, Third Party Advisory
References () https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 - Patch () https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 - Patch

17 Jul 2024, 15:28

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 - Broken Link, Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html - () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html - () http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/03/24/11 - () http://www.openwall.com/lists/oss-security/2015/03/24/11 - Mailing List
References () http://www.securitytracker.com/id/1032418 - () http://www.securitytracker.com/id/1032418 - Broken Link, Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1205079 - () https://bugzilla.redhat.com/show_bug.cgi?id=1205079 - Issue Tracking, Third Party Advisory
References () https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 - () https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 - Patch

Information

Published : 2015-05-27 10:59

Updated : 2024-11-21 02:21


NVD link : CVE-2014-9710

Mitre link : CVE-2014-9710

CVE.ORG link : CVE-2014-9710


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')