Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 24 Sep 2008 14:19:42 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: coley@...re.org
Subject: Re: CVE request: kernel: open() call allows setgid
 bit when user is not in new file's group


On Wed, 24 Sep 2008, Eugene Teo wrote:

> "When creating a file, open()/creat() allows the setgid bit to be set
> via the mode argument even when, due to the bsdgroups mount option or
> the file being created in a setgid directory, the new file's group is
> one which the user is not a member of.  The user can then use
> ftruncate() and memory-mapped I/O to turn the new file into an arbitrary
> binary and thus gain the privileges of this group, since these
> operations do not clear the setgid bit."

Use CVE-2008-4210, to  be filled in later.

- Steve

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ