CVE-2008-3833

CVE Details

Release Date:2008-10-03

Description


The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.

See more information about CVE-2008-3833 from MITRE CVE dictionary and NIST NVD


CVSS v2.0 metrics


NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 4.9 Base Metrics: AV:L/AC:L/Au:N/C:C/I:N/A:N
Access Vector: Local network Attack Complexity: Low
Authentication: None required Confidentiality Impact: Complete
Integrity Impact: None Availability Impact: None

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (kernel)ELSA-2008-09572008-11-05
Oracle Linux version 5 (ocfs2-2.6.18-92.1.17.0.1.el5)ELSA-2008-09572008-11-05
Oracle Linux version 5 (oracleasm-2.6.18-92.1.17.0.1.el5)ELSA-2008-09572008-11-05



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete