First published: Wed Jul 21 2010(Updated: )
Description of problem: 1. <a href="https://access.redhat.com/security/cve/CVE-2010-2537">CVE-2010-2537</a> - The BTRFS_IOC_CLONE and BTRFS_IOC_CLONE_RANGE ioctls should check whether the donor file is append-only before writing to it. 2. <a href="https://access.redhat.com/security/cve/CVE-2010-2538">CVE-2010-2538</a> - The BTRFS_IOC_CLONE_RANGE ioctl appears to have an integer overflow that allows a user to specify an out-of-bounds range to copy from the source file (if off + len wraps around). Upstream commit: <a href="http://git.kernel.org/linus/2ebc3464781ad24474abcbd2274e6254689853b5">http://git.kernel.org/linus/2ebc3464781ad24474abcbd2274e6254689853b5</a> Reference: <a href="https://btrfs.wiki.kernel.org/index.php/Main_Page">https://btrfs.wiki.kernel.org/index.php/Main_Page</a> The kernel in Red Hat Enterprise Linux 6 has support for Btrfs by default.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.35 | |
Ubuntu Linux | =9.10 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
SUSE Linux Enterprise High Availability | =11-sp1 | |
SUSE Linux Enterprise Desktop | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2537 has a moderate severity level due to potential data loss risks when handling append-only files.
To fix CVE-2010-2537, update your Linux kernel to a version that incorporates the necessary checks for append-only files.
CVE-2010-2537 affects Linux kernel versions prior to 2.6.35 and specific versions of Ubuntu and SUSE Linux.
CVE-2010-2537 may allow an attacker to modify a file that should be append-only, leading to unauthorized data changes.
CVE-2010-2537 is not known to be exploitable remotely, as it requires local access to manipulate files directly.