CVE-2008-4210

Linux Kernel < 2.6.21.7 - Access Control

Title source: rule

Description

fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.

Exploits (1)

exploitdb WORKING POC VERIFIED
by gat3way · clocallinux
https://www.exploit-db.com/exploits/6851

References (31)

... and 11 more

Scores

EPSS 0.1130
EPSS Percentile 93.6%

Details

CWE
CWE-264
Status published
Products (23)
linux/linux_kernel 2.2.27
linux/linux_kernel 2.4.36
linux/linux_kernel 2.4.36.1
linux/linux_kernel 2.4.36.2
linux/linux_kernel 2.4.36.3
linux/linux_kernel 2.4.36.4
linux/linux_kernel 2.4.36.5
linux/linux_kernel 2.4.36.6
linux/linux_kernel 2.6
linux/linux_kernel 2.6.18 (8 CPE variants)
... and 13 more
Published Sep 29, 2008
Tracked Since Feb 18, 2026