Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 386385 - Kernel: mext_check_arguments: Privilege escalation (CVE-2010-2066)
Summary: Kernel: mext_check_arguments: Privilege escalation (CVE-2010-2066)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: [linux <2.6.35]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-10-08 16:25 UTC by GLSAMaker/CVETool Bot
Modified: 2013-09-15 20:07 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2011-10-08 16:25:02 UTC
CVE-2010-2066 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2066):
  The mext_check_arguments function in fs/ext4/move_extent.c in the Linux
  kernel before 2.6.35 allows local users to overwrite an append-only file via
  a MOVE_EXT ioctl call that specifies this file as a donor.