Released on: 2010-07-08
Updated on: 2010-09-13
Affected Systems:
Linux kernel 2.6.x
Unaffected system:
Linux kernel 2.6.35
Description:
--------------------------------------------------------------------------------
Bugtraq id: 41466
Cve id: CVE-2010-2066
Linux Kernel is the Kernel used by open source Linux.
The mext_check_arguments function in the fs/ext4/move_extent.c file of Linux Kernel does not correctly perform the permission check. If the donor file is only an attribute file (AOF), the local user can overwrite the file by calling MOVE_EXT ioctl.
<* Source: Theodore Ts 'o (tytso@mit.edu)
Link: https://bugzilla.redhat.com/show_bug.cgi? Format = multiple & amp; id = 601006
Https://www.redhat.com/support/errata/RHSA-2010-0610.html
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Linux
-----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://git.kernel.org /? P = linux/kernel/git/torvalds/linux-2.6.git; a = commit; h = 1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72
RedHat
------
For this reason, RedHat has released a Security Bulletin (RHSA-2010: 0610-01) and patch:
RHSA-2010: 0610-01: Important: kernel security and bug fix update
Link: https://www.redhat.com/support/errata/RHSA-2010-0610.html