Public Date:
463661: CVE-2008-4210 kernel: open() call allows setgid bit when user is not in new file's group

The MITRE CVE dictionary describes this issue as:

fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.

Find out more about CVE-2008-4210 from the MITRE CVE dictionary dictionary and NIST NVD.

Red Hat Security Errata

Platform Errata Release Date
Red Hat Linux Advanced Workstation 2.1 (kernel) RHSA-2008:0787 2009-01-05
Red Hat Enterprise Linux version 3 (kernel) RHSA-2008:0973 2008-12-17
Red Hat Enterprise Linux version 5 (kernel) RHSA-2008:0957 2008-11-04
Red Hat Enterprise Linux version 4 (kernel) RHSA-2008:0972 2008-11-19
Red Hat Enterprise Linux version 2.1 (kernel) RHSA-2009:0001 2009-01-08