Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-4411

Опубликовано: 24 дек. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 3.7

Описание

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

2.2.49-2
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

not-affected

2.2.49-2
maverick

not-affected

2.2.49-2
natty

not-affected

2.2.49-2
oneiric

not-affected

2.2.49-2

Показывать по

Ссылки на источники

EPSS

Процентиль: 21%
0.00068
Низкий

3.7 Low

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

nvd
почти 16 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

debian
почти 16 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when runni ...

github
больше 3 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

EPSS

Процентиль: 21%
0.00068
Низкий

3.7 Low

CVSS2