Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 245013 - Linux <2.6.19 Remove SUID when splicing into an inode (CVE-2008-3833)
Summary: Linux <2.6.19 Remove SUID when splicing into an inode (CVE-2008-3833)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://git.kernel.org/?p=linux/kernel...
Whiteboard: [linux <2.6.19]
Keywords:
Depends on:
Blocks:
 
Reported: 2008-10-30 22:19 UTC by Robert Buchholz (RETIRED)
Modified: 2009-07-22 14:30 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2008-10-30 22:19:14 UTC
CVE-2008-3833 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3833):
  The generic_file_splice_write function in fs/splice.c in the Linux
  kernel before 2.6.19 does not properly strip setuid and setgid bits
  when there is a write to a file, which allows local users to gain the
  privileges of a different group, and obtain sensitive information or
  possibly have unspecified other impact, by splicing into an inode in
  order to create an executable file in a setgid directory, a different
  vulnerability than CVE-2008-4210.