CVE-2008-4210

fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.6 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
VendorProductVersion
linuxlinux_kernel
𝑥
≤ 2.6.21.7
linuxlinux_kernel
2.2.27
linuxlinux_kernel
2.4.36
linuxlinux_kernel
2.4.36.1
linuxlinux_kernel
2.4.36.2
linuxlinux_kernel
2.4.36.3
linuxlinux_kernel
2.4.36.4
linuxlinux_kernel
2.4.36.5
linuxlinux_kernel
2.4.36.6
linuxlinux_kernel
2.6
linuxlinux_kernel
2.6.18
linuxlinux_kernel
2.6.18:rc1
linuxlinux_kernel
2.6.18:rc2
linuxlinux_kernel
2.6.18:rc3
linuxlinux_kernel
2.6.18:rc4
linuxlinux_kernel
2.6.18:rc5
linuxlinux_kernel
2.6.18:rc6
linuxlinux_kernel
2.6.18:rc7
linuxlinux_kernel
2.6.19.4
linuxlinux_kernel
2.6.19.5
linuxlinux_kernel
2.6.19.6
linuxlinux_kernel
2.6.19.7
linuxlinux_kernel
2.6.20.16
linuxlinux_kernel
2.6.20.17
linuxlinux_kernel
2.6.20.18
linuxlinux_kernel
2.6.20.19
linuxlinux_kernel
2.6.20.20
linuxlinux_kernel
2.6.20.21
linuxlinux_kernel
2.6.21.5
linuxlinux_kernel
2.6.21.6
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
intrepid
not-affected
hardy
not-affected
gutsy
dne
feisty
dne
dapper
dne
linux-source-2.6.15
intrepid
dne
hardy
dne
gutsy
dne
feisty
dne
dapper
Fixed 2.6.15-53.74
released
linux-source-2.6.20
intrepid
dne
hardy
dne
gutsy
dne
feisty
ignored
dapper
dne
linux-source-2.6.22
intrepid
dne
hardy
dne
gutsy
not-affected
feisty
dne
dapper
dne
Common Weakness Enumeration
References