CVE-2008-4210

Linux Kernel < 2.6.21.7 - Access Control

Title source: rule

Description

fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.

Exploits (1)

exploitdb WORKING POC VERIFIED
by gat3way · clocallinux
https://www.exploit-db.com/exploits/6851

References (31)

... and 11 more

Scores

EPSS 0.1130
EPSS Percentile 93.4%

Classification

CWE
CWE-264
Status draft

Affected Products (30)

linux/linux_kernel < 2.6.21.7
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
... and 15 more

Timeline

Published Sep 29, 2008
Tracked Since Feb 18, 2026