Name | CVE-2014-9710 |
Description | The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time window, related to a race condition, or (2) after an xattr-replacement attempt that fails because the data does not fit. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
linux (PTS) | bullseye (security), bullseye | 5.10.223-1 | fixed |
bookworm | 6.1.106-3 | fixed | |
bookworm (security) | 6.1.112-1 | fixed | |
trixie | 6.10.11-1 | fixed | |
sid | 6.10.12-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
linux | source | (unstable) | 3.16.7-ckt9-1 | |||
linux-2.6 | source | (unstable) | (unfixed) |
[wheezy] - linux <no-dsa> (btrfs in 3.2 is just a tech preview and not usable for production)
[squeeze] - linux-2.6 <no-dsa> (btrfs in 2.6.32 is just a tech preview and not usable for production)
Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 (v3.19-rc1)
https://www.openwall.com/lists/oss-security/2015/03/24/11