First published: Mon Jun 07 2010(Updated: )
Description of problem: If the donor file is an append-only file, we should not allow the operation to proceed, lest we end up overwriting the contents of an append-only file. Upstream commit: <a href="http://git.kernel.org/linus/1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72">http://git.kernel.org/linus/1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.35 | |
VMware ESX | =4.0 | |
VMware ESX | =4.1 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =9.10 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
SUSE Linux Enterprise High Availability | =11-sp1 | |
SUSE Linux Enterprise Desktop | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-2066 is high due to the risk of overwriting data in append-only files.
To fix CVE-2010-2066, update your Linux kernel or affected software to a version that implements the necessary checks against overwriting append-only files.
CVE-2010-2066 affects multiple systems including specific versions of the Linux kernel, VMware ESX, and Ubuntu Linux.
The impact of CVE-2010-2066 includes potential data loss and corruption due to unauthorized overwriting of append-only files.
CVE-2010-2066 was discovered and publicly acknowledged in 2010.