3.3 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:P/A:N
kernel is vulnerable to authentication bypass. The vulnerability exists as a user who has a CIFS share mounted that required successful authentication, a local, unprivileged user could mount that share without knowing the correct password if mount.cifs was setuid root.
ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ff67b720c02c36e54d55b88c2931879b7db1cd2
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ff67b720c02c36e54d55b88c2931879b7db1cd2
lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
www.openwall.com/lists/oss-security/2011/04/15/8
access.redhat.com/errata/RHSA-2011:1253
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=697394
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2.0/html/Technical_Notes/index.html
github.com/torvalds/linux/commit/4ff67b720c02c36e54d55b88c2931879b7db1cd2