First published: Sat Nov 13 2010(Updated: )
Reported by Dave Jones, currently we have: --w--w--w-. 1 root root 0 2010-11-11 14:56 /sys/kernel/debug/acpi/custom_method which is just crazy. Change this to --w-------. This custom_method file allows to inject custom ACPI methods into the ACPI interpreter tables. This control file was introduced with world writeable permissions in Linux Kernel 2.6.33. Introduced in: <a href="http://git.kernel.org/linus/a1a541d86f50a9957beeedb122a035870d602647">http://git.kernel.org/linus/a1a541d86f50a9957beeedb122a035870d602647</a> <a href="http://git.kernel.org/linus/a25ee9200eef07377e1703697afbb5d81f89e500">http://git.kernel.org/linus/a25ee9200eef07377e1703697afbb5d81f89e500</a> Fixed in: <a href="http://git.kernel.org/linus/ed3aada1bf34c5a9e98af167f125f8a740fc726a">http://git.kernel.org/linus/ed3aada1bf34c5a9e98af167f125f8a740fc726a</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:2.6.33.7-rt29.55.el5 | 0:2.6.33.7-rt29.55.el5 |
Linux Kernel | <2.6.36.2 | |
openSUSE | =11.3 | |
SUSE Linux Enterprise Real Time Extension | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4347 has been classified as a high severity vulnerability due to its potential to allow unauthorized access to critical system functions.
To fix CVE-2010-4347, update the kernel to version 2.6.36.2 or later, or apply the necessary patches as recommended by your distribution.
The potential impacts of CVE-2010-4347 include privilege escalation and the ability for attackers to execute arbitrary code through custom ACPI methods.
CVE-2010-4347 affects several distributions including Red Hat Enterprise Linux, openSUSE 11.3, and SUSE Linux Enterprise Real Time Extension 11 SP1.
A temporary workaround for CVE-2010-4347 may include changing the permissions of the /sys/kernel/debug/acpi/custom_method file to restrict access.