CVE-2010-2226

Priority
Medium
Description
The xfs_swapext function in fs/xfs/xfs_dfrag.c in the Linux kernel before
2.6.35 does not properly check the file descriptors passed to the SWAPEXT
ioctl, which allows local users to leverage write access and obtain read
access by swapping one file into another file.
Ubuntu-Description
Dan Rosenberg discovered that the swapexit xfs ioctl did not correctly
check file permissions. A local attacker could exploit this to read from
write-only files, leading to a loss of privacy.
References
Bugs
Assigned-to
bradf
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Source: linux (LP Ubuntu Debian)
Upstream:needs-triage
Patches:
Upstream:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=1817176a86352f65210139d4c794ad2d19fc6b63
Hardy:http://chinstrap.ubuntu.com/~bradf/CVEs/CVE-2010-2226/patches/hardy/linux/0001-xfs-prevent-swapext-from-operating-on-write-only-files.txt
Jaunty:http://chinstrap.ubuntu.com/~bradf/CVEs/CVE-2010-2226/patches/jaunty/linux/0001-xfs-prevent-swapext-from-operating-on-write-only-files.txt
Karmic:http://chinstrap.ubuntu.com/~bradf/CVEs/CVE-2010-2226/patches/karmic/linux/0001-xfs-prevent-swapext-from-operating-on-write-only-files.txt
More Information

Valid XHTML 1.0 Strict

Updated: 2015-07-29 20:38:41 UTC (commit 9756)