CVE-2010-1636
Published Jun 8, 2010
Last updated 2 years ago
Overview
- Description
- The btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the btrfs functionality in the Linux kernel 2.6.29 through 2.6.32, and possibly other versions, does not ensure that a cloned file descriptor has been opened for reading, which allows local users to read sensitive information from a write-only file descriptor.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C386B13F-9D7C-45F8-B86A-886384144A8D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04BCABEB-DE2A-4C85-BFD5-7A1318479ECA" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A67A63E8-837E-4162-999E-3B3DAAE57C96" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A701E87D-B807-426E-9CD4-6721DBCABE19" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66F6E506-EC0A-4784-BDA3-B7B5CD938B92" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBFA0277-B491-4BB1-88DC-85362F0A689C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE922924-6496-4D24-94A6-8EDD431A4568" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10E55450-F6D9-483C-9CC8-E651E5A12AB1" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99AC6D46-A0BF-4F1D-88BB-03BF74FDB84F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC40B6DE-09D9-422B-965B-7EB9F6661DEB" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEFB6E91-34CD-4FC5-A8E1-8F5760A9B4C0" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91170B40-4D25-4E40-8F0B-DBC1AE217F99" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E28B8B9-B832-4D77-BE1A-BB5D8A678678" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56DF61F4-5DA1-4D79-B6C0-0E4DB825FB3A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "468745AA-0BE5-4B22-91FA-2FD350BD2F64" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF208118-3534-47E5-9943-83EF165F1249" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "427E3009-A2F2-4ED2-8D1A-14938F639D2A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD3663BD-4EF5-496C-A573-2639C9E72214" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4033E0B-A3A1-4CC5-956A-AAA0FB905DDA" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC3151BF-4BEE-4415-ABA2-E6D40673E591" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1037E899-6DB3-423D-9AD0-FE79A67E9681" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4DD2F05-F990-417A-BD6D-CD9A7EB2BD55" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0634D7FE-7685-4669-8EF9-54E99683D28E" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EEEB962-0E8D-402B-989E-96875453C609" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0042D9C4-7081-4DC2-A5B5-2649374B44F3" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CD18FA2-677A-4934-88E6-0BB78D789875" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24EF19A2-A1CC-4410-8704-EF4041428383" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9502A7E-2BFF-43A7-BF6B-ADC023BD9331" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DC9A36E-1779-49DE-83CE-B8479CA018FA" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60B18050-4720-4ACB-AEE2-DEB4BFCA7B6E" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9704C4B5-28F1-4F62-A389-8A9917E8E99D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6574F543-0B91-49A6-81FA-8142007BCD54" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46568A0D-F374-4DAB-9B64-FCC74A9AA07B" } ], "operator": "OR" } ] } ]