First published: Thu Jun 17 2010(Updated: )
Description of problem: User "foo" can use the SWAPEXT ioctl to swap a write-only file owned by user "bar" into a file owned by "foo" and subsequently reading it. It does so by checking that the file descriptors passed to the ioctl are also opened for reading. References: <a href="http://archives.free.net.ph/message/20100616.130710.301704aa.en.html">http://archives.free.net.ph/message/20100616.130710.301704aa.en.html</a> <a href="http://archives.free.net.ph/message/20100616.135735.40f53a32.en.html">http://archives.free.net.ph/message/20100616.135735.40f53a32.en.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.35 | |
SUSE Linux Enterprise Desktop | =10-sp3 | |
SUSE Linux Enterprise Server | =10-sp3 | |
SUSE Linux Enterprise Software Development Kit | =10-sp3 | |
Debian Linux | =5.0 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 | |
Ubuntu | =10.04 | |
Ubuntu | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2226 is classified as a high-severity vulnerability that allows unauthorized file access.
To fix CVE-2010-2226, update your Linux kernel to a version later than 2.6.35.
CVE-2010-2226 affects users of Linux Kernel versions up to 2.6.35, as well as specific distributions such as Debian, Ubuntu, and SUSE.
Systems running vulnerable versions of the Linux Kernel, including Debian Linux 5.0 and specific versions of Ubuntu and SUSE, are susceptible to CVE-2010-2226.
CVE-2010-2226 is exploited through the SWAPEXT ioctl, allowing a user to access files they should not have permission to read.