Description
The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2010-2085 | The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor. |
Ubuntu USN |
USN-1000-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1074-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1074-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1083-1 | Linux kernel vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Linux
Subscribe
Linux Kernel
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Suse
Subscribe
Linux Enterprise High Availability Extension
Subscribe
Suse Linux Enterprise Desktop
Subscribe
Suse Linux Enterprise Server
Subscribe
Vmware
Subscribe
Esx
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T02:17:14.515Z
Reserved: 2010-05-25T00:00:00.000Z
Link: CVE-2010-2066
No data.
Status : Deferred
Published: 2010-09-08T20:00:02.667
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-2066
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN