Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-2066

Опубликовано: 02 июн. 2010
Источник: redhat
CVSS2: 1.9
EPSS Низкий

Описание

The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.

Отчет

This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG as they did not include support for the Ext4 filesystem. A future kernel update in Red Hat Enterprise Linux 5 will address this issue.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=601006kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files

EPSS

Процентиль: 19%
0.00061
Низкий

1.9 Low

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 15 лет назад

The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.

CVSS3: 5.5
nvd
почти 15 лет назад

The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.

CVSS3: 5.5
debian
почти 15 лет назад

The mext_check_arguments function in fs/ext4/move_extent.c in the Linu ...

CVSS3: 5.5
github
около 3 лет назад

The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.

oracle-oval
почти 15 лет назад

ELSA-2010-0610: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 19%
0.00061
Низкий

1.9 Low

CVSS2