Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4BBE9B39.8060802@kernel.sg>
Date: Fri, 09 Apr 2010 11:12:57 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
CC: coley@...us.mitre.org
Subject: CVE-2010-1146 kernel: reiserfs priv escalation

Credit: Matt McCutchen. The kernel allows processes to access the 
internal ".reiserfs_priv" directory at the top of a reiserfs filesystem 
which is used to store xattrs. Permissions are not enforced in that 
tree, so unprivileged users can view and potentially modify the xattrs 
on arbitrary files.

CERT/CC (http://www.cert.org/), report ID VRF#G7I2H94M

https://bugzilla.redhat.com/show_bug.cgi?id=568041
http://marc.info/?l=linux-kernel&m=127076012022155&w=2

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.