kernel is vulnerable to privilege escalation. The vulnerability exists as permission issues were found in the megaraid_sas driver. The “dbg_lvl” and “poll_mode_io” files on the sysfs file system (“/sys/”) had world-writable permissions. This could allow local, unprivileged users to change the behavior of the driver.
kbase.redhat.com/faq/docs/DOC-20536
lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html
lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html
lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html
lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html
lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html
lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html
osvdb.org/60201
secunia.com/advisories/37909
secunia.com/advisories/38017
secunia.com/advisories/38276
secunia.com/advisories/38492
secunia.com/advisories/38779
support.avaya.com/css/P8/documents/100073666
www.debian.org/security/2010/dsa-1996
www.openwall.com/lists/oss-security/2009/11/13/1
www.redhat.com/security/updates/classification/#important
www.securityfocus.com/bid/37019
www.ubuntu.com/usn/usn-864-1
access.redhat.com/errata/RHSA-2010:0046
bugzilla.redhat.com/show_bug.cgi?id=526068
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540
rhn.redhat.com/errata/RHSA-2010-0046.html
rhn.redhat.com/errata/RHSA-2010-0095.html