Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-4411

Опубликовано: 24 дек. 2009
Источник: debian
EPSS Низкий

Описание

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
aclfixed2.2.49-2package
aclnot-affectedetchpackage
aclno-dsalennypackage

Примечания

  • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499076#51

EPSS

Процентиль: 21%
0.00068
Низкий

Связанные уязвимости

ubuntu
почти 16 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

redhat
больше 17 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

nvd
почти 16 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

github
больше 3 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

EPSS

Процентиль: 21%
0.00068
Низкий