First published: Tue May 12 2009(Updated: )
Description of problem: Frank Filz reported: the problem is that permission checking is skipped if atomic open is possible, but when exec opens a file, it just opens it O_READONLY which means EXEC permission will not be checked at that time. This problem is observed by the following sequence (executed as root): mount -t nfs4 server:/ /mnt4 echo "ls" >/mnt4/foo chmod 744 /mnt4/foo su guest -c "mnt4/foo" Reference: <a href="http://article.gmane.org/gmane.linux.nfs/26592">http://article.gmane.org/gmane.linux.nfs/26592</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=2.6.29.3 | |
SUSE Linux | =11.1 | |
SUSE Linux | =11.0 | |
Debian | =5.0 | |
Debian | =4.0 | |
Ubuntu | =9.04 | |
Ubuntu | =8.10 | |
Ubuntu | =8.04 | |
Ubuntu | =6.06 | |
VMware ESXi | =3.5 | |
VMware ESXi | =4.0 | |
VMware ESXi | =2.5.5 | |
VMware ESXi | =3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-1630 is classified as medium risk due to potential unauthorized file access.
To fix CVE-2009-1630, ensure that your system is updated to a kernel version that contains the appropriate patch.
CVE-2009-1630 affects various Linux distributions, including specific versions of Debian, Ubuntu, openSUSE, and VMware ESX.
CVE-2009-1630 exploits the lack of permission checking during file execution due to atomic open mechanisms.
You can verify vulnerability to CVE-2009-1630 by checking your Linux kernel version against the versions listed in the vulnerability report.