4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
kernel is vulnerable to privilege escalation. The vulnerability exists as a flaw was found in the NFSv4 implementation. The kernel would do an unnecessary permission check after creating a file. This check would usually fail and leave the file with the permission bits set to random values.
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=81ac95c5
kbase.redhat.com/faq/docs/DOC-18042
lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
lists.vmware.com/pipermail/security-announce/2010/000082.html
secunia.com/advisories/37105
secunia.com/advisories/38794
secunia.com/advisories/38834
www.openwall.com/lists/oss-security/2009/09/21/2
www.redhat.com/security/updates/classification/#important
www.ubuntu.com/usn/USN-852-1
www.vupen.com/english/advisories/2010/0528
access.redhat.com/errata/RHSA-2009:1548
bugzilla.redhat.com/show_bug.cgi?id=524520
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7527
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9757
rhn.redhat.com/errata/RHSA-2009-1548.html