Vulnerability Description
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time window, related to a race condition, or (2) after an xattr-replacement attempt that fails because the data does not fit.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 3.10.83 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Broken LinkVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2015/03/24/11Mailing List
- http://www.securitytracker.com/id/1032418Broken LinkThird Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1205079Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d133Patch
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Broken LinkVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2015/03/24/11Mailing List
- http://www.securitytracker.com/id/1032418Broken LinkThird Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1205079Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d133Patch
FAQ
What is CVE-2014-9710?
CVE-2014-9710 is a vulnerability with a CVSS score of 6.9 (MEDIUM). The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settin...
How severe is CVE-2014-9710?
CVE-2014-9710 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9710?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.