6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
kernel is vulnerable to privilege escalation. /sys/kernel/debug/acpi/custom_method
had world-writable permissions, which could allow a local, unprivileged user to escalate their privileges. Note: The debugfs file system must be mounted locally to exploit this issue. It is not mounted by default.
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/1.3/html/Technical_Notes/chap-Package_Updates.html#RHSA-2011-0330
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed3aada1bf34c5a9e98af167f125f8a740fc726a
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ed3aada1bf34c5a9e98af167f125f8a740fc726a
lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
openwall.com/lists/oss-security/2010/12/15/3
openwall.com/lists/oss-security/2010/12/15/7
secunia.com/advisories/42778
www.exploit-db.com/exploits/15774/
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
www.securityfocus.com/bid/45408
www.vupen.com/english/advisories/2011/0012
www.vupen.com/english/advisories/2011/0298
access.redhat.com/errata/RHSA-2011:0330
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=663542
exchange.xforce.ibmcloud.com/vulnerabilities/64155