Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-3833

Опубликовано: 03 окт. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.9

Описание

The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

feisty

DNE

gutsy

DNE

hardy

not-affected

upstream

not-affected

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

DNE

feisty

DNE

gutsy

DNE

hardy

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

not-affected

gutsy

DNE

hardy

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

DNE

gutsy

not-affected

hardy

DNE

upstream

not-affected

Показывать по

Ссылки на источники

EPSS

Процентиль: 8%
0.00034
Низкий

4.9 Medium

CVSS2

Связанные уязвимости

redhat
больше 18 лет назад

The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.

nvd
больше 16 лет назад

The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.

debian
больше 16 лет назад

The generic_file_splice_write function in fs/splice.c in the Linux ker ...

github
около 3 лет назад

The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.

oracle-oval
больше 16 лет назад

ELSA-2008-0957: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 8%
0.00034
Низкий

4.9 Medium

CVSS2