Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 24 Sep 2008 18:35:12 +0800
From: Eugene Teo <>
Subject: CVE request: kernel: open() call allows setgid bit when user is not
 in new file's group

This was committed in upstream kernel; Reported by David Watson.

"When creating a file, open()/creat() allows the setgid bit to be set
via the mode argument even when, due to the bsdgroups mount option or
the file being created in a setgid directory, the new file's group is
one which the user is not a member of.  The user can then use
ftruncate() and memory-mapped I/O to turn the new file into an arbitrary
binary and thus gain the privileges of this group, since these
operations do not clear the setgid bit."

This bug could lead to a possible privileged information disclosure.

Upstream commit:


Thanks, Eugene
Eugene Teo / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ