2024-07-14 02:06:08 +00:00

123 lines
4.0 KiB
JSON

{
"id": "CVE-2007-4849",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-09-12T20:17:00.000",
"lastModified": "2023-11-07T02:01:07.633",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "JFFS2, as used on One Laptop Per Child (OLPC) build 542 and possibly other Linux systems, when POSIX ACL support is enabled, does not properly store permissions during (1) inode creation or (2) ACL setting, which might allow local users to access restricted files or directories after a remount of a filesystem, related to \"legacy modes\" and an inconsistency between dentry permissions and inode permissions."
},
{
"lang": "es",
"value": "JFFS2. utilizado sobre One Laptop Per Child (OLPC) construci\u00f3n 542 y posiblemente otros sistemas Linux, cuando el apoyo POSIX ACL est\u00e1 activado, no almancena de forma adecuada los permisos a lo largo de (1) la creaci\u00f3n de un inodo o la configuraci\u00f3n (2) ACL. el cual podr\u00eda permitir a usuarios locales acceder a archivos o directorios restringidos despu\u00e9s de remontar el sistema de archivos, relacionado con \"modos de herencia\" y una inconsistencia entre permisos de entrada y permisos de inode."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "Not vulnerable. There is no support for jffs2 in the Linux kernel as distributed with Red Hat Enterprise Linux 2.1 or 3. There is no ACL support for jffs2 in the Linux kernel as distributed with Red Hat Enterprise Linux 4 or 5.",
"lastModified": "2007-10-10T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:one_laptop_per_child:olpc_linux:build_542:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98BD1C-5508-4CDE-9077-0FBE17E32340"
}
]
}
]
}
],
"references": [
{
"url": "http://dev.laptop.org/ticket/2732",
"source": "cve@mitre.org"
},
{
"url": "http://git.infradead.org/?p=mtd-2.6.git%3Ba=commitdiff%3Bh=9ed437c50d89eabae763dd422579f73fdebf288d",
"source": "cve@mitre.org"
},
{
"url": "http://lists.infradead.org/pipermail/linux-mtd-cvs/2007-August/005897.html",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/26978",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/28170",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/28706",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2007/dsa-1378",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/25838",
"source": "cve@mitre.org"
},
{
"url": "http://www.ubuntu.com/usn/usn-558-1",
"source": "cve@mitre.org"
},
{
"url": "http://www.ubuntu.com/usn/usn-574-1",
"source": "cve@mitre.org"
}
]
}