Описание
The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.
The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2010-1146
- https://bugzilla.redhat.com/show_bug.cgi?id=568041
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57782
- http://marc.info/?l=linux-kernel&m=127076012022155&w=2
- http://osvdb.org/63601
- http://secunia.com/advisories/39316
- http://www.exploit-db.com/exploits/12130
- http://www.securityfocus.com/bid/39344
EPSS
CVE ID
Связанные уязвимости
The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.
The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.
The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exis ...
EPSS