Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-4210

Опубликовано: 29 сент. 2008
Источник: ubuntu
Приоритет: low
EPSS Средний
CVSS2: 4.6

Описание

fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

feisty

DNE

gutsy

DNE

hardy

not-affected

intrepid

not-affected

upstream

released

2.6.22

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-53.74
devel

DNE

feisty

DNE

gutsy

DNE

hardy

DNE

intrepid

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

ignored

end of life, was needed
gutsy

DNE

hardy

DNE

intrepid

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

DNE

gutsy

not-affected

hardy

DNE

intrepid

DNE

upstream

not-affected

Показывать по

EPSS

Процентиль: 94%
0.13378
Средний

4.6 Medium

CVSS2

Связанные уязвимости

redhat
около 18 лет назад

fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.

nvd
больше 16 лет назад

fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.

debian
больше 16 лет назад

fs/open.c in the Linux kernel before 2.6.22 does not properly strip se ...

github
около 3 лет назад

fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.

oracle-oval
больше 16 лет назад

ELSA-2008-0957: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 94%
0.13378
Средний

4.6 Medium

CVSS2