CVE-2008-4210
Linux Kernel < 2.6.21.7 - Access Control
Title source: ruleDescription
fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.
Exploits (1)
References (31)
... and 11 more
Scores
EPSS
0.1130
EPSS Percentile
93.4%
Classification
CWE
CWE-264
Status
draft
Affected Products (30)
linux/linux_kernel
< 2.6.21.7
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
... and 15 more
Timeline
Published
Sep 29, 2008
Tracked Since
Feb 18, 2026