DEBIAN-CVE-2009-4411

Source
https://security-tracker.debian.org/tracker/CVE-2009-4411
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2009-4411.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2009-4411
Upstream
Published
2009-12-24T16:30:00Z
Modified
2025-09-25T00:12:34.202429Z
Summary
[none]
Details

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

References

Affected packages

Debian:11 / acl

Package

Name
acl
Purl
pkg:deb/debian/acl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.49-2

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / acl

Package

Name
acl
Purl
pkg:deb/debian/acl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.49-2

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / acl

Package

Name
acl
Purl
pkg:deb/debian/acl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.49-2

Ecosystem specific

{
    "urgency": "low"
}

Debian:14 / acl

Package

Name
acl
Purl
pkg:deb/debian/acl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.49-2

Ecosystem specific

{
    "urgency": "low"
}