Bug 605158 (CVE-2010-2226) - CVE-2010-2226 kernel: xfs swapext ioctl minor security issue
Summary: CVE-2010-2226 kernel: xfs swapext ioctl minor security issue
Alias: CVE-2010-2226
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Whiteboard: impact=moderate,public=20100617,repor...
Keywords: Security
Depends On: 605160 605161 605162
TreeView+ depends on / blocked
Reported: 2010-06-17 10:37 UTC by Eugene Teo (Security Response)
Modified: 2019-06-08 13:01 UTC (History)
9 users (show)

Clone Of:
Last Closed: 2012-03-28 08:56:13 UTC

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0610 normal SHIPPED_LIVE Important: kernel security and bug fix update 2010-08-10 18:01:15 UTC

Description Eugene Teo (Security Response) 2010-06-17 10:37:38 UTC
Description of problem:
User "foo" can use the SWAPEXT ioctl to swap a write-only file owned by user "bar" into a file owned by "foo" and subsequently reading it. It does so by checking that the file descriptors passed to the ioctl are also opened for reading.


Comment 2 Eugene Teo (Security Response) 2010-06-17 11:01:24 UTC

Red Hat would like to thank Dan Rosenberg for reporting this issue.

Comment 3 Eugene Teo (Security Response) 2010-06-17 11:02:19 UTC

This issue did not affect the version of Linux kernel as shipped with Red Hat
Enterprise Linux 3, 4 and Red Hat Enterprise MRG as they did not include
support for the XFS filesystem. A future kernel update in Red Hat Enterprise
Linux 5 will address this issue.

Comment 4 Eugene Teo (Security Response) 2010-07-08 02:11:42 UTC
Upstream commit:

Comment 5 errata-xmlrpc 2010-08-10 18:01:50 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0610 https://rhn.redhat.com/errata/RHSA-2010-0610.html

Note You need to log in before you can comment on or make changes to this bug.