Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-3833

Опубликовано: 17 окт. 2006
Источник: redhat
EPSS Низкий

Описание

The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.

Отчет

This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=464450kernel: remove SUID when splicing into an inode

EPSS

Процентиль: 12%
0.00039
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.

nvd
больше 17 лет назад

The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.

debian
больше 17 лет назад

The generic_file_splice_write function in fs/splice.c in the Linux ker ...

github
почти 4 года назад

The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.

oracle-oval
больше 17 лет назад

ELSA-2008-0957: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 12%
0.00039
Низкий