CVE-2009-3939

The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html Mailing List
http://osvdb.org/60201 Broken Link
http://secunia.com/advisories/37909 Broken Link
http://secunia.com/advisories/38017 Broken Link
http://secunia.com/advisories/38276 Broken Link
http://secunia.com/advisories/38492 Broken Link
http://secunia.com/advisories/38779 Broken Link
http://support.avaya.com/css/P8/documents/100073666 Third Party Advisory
http://www.debian.org/security/2010/dsa-1996 Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/11/13/1 Mailing List
http://www.securityfocus.com/bid/37019 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-864-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=526068 Exploit Issue Tracking
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540 Broken Link
https://rhn.redhat.com/errata/RHSA-2010-0046.html Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2010-0095.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:virtualization:5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:avaya:aura_application_enablement_services:5.2:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_application_enablement_services:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_communication_manager:5.2:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_session_manager:1.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_session_manager:5.2:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_sip_enablement_services:5.2:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_system_manager:5.2:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_system_manager:6.0:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_system_platform:1.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:voice_portal:5.0:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*

History

No history.

Information

Published : 2009-11-16 19:30

Updated : 2024-01-25 21:37


NVD link : CVE-2009-3939

Mitre link : CVE-2009-3939

CVE.ORG link : CVE-2009-3939


JSON object : View

Products Affected

avaya

  • aura_system_platform
  • aura_communication_manager
  • aura_system_manager
  • aura_sip_enablement_services
  • voice_portal
  • aura_application_enablement_services
  • aura_session_manager

suse

  • linux_enterprise_desktop
  • linux_enterprise_server

redhat

  • virtualization
  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_workstation

opensuse

  • opensuse

canonical

  • ubuntu_linux

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource