Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2008:0973-10
Type: Security Advisory
Severity: Important
Issued on: 2008-12-16
Last updated on: 2008-12-16
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2007-6063
CVE-2008-0598
CVE-2008-2136
CVE-2008-2812
CVE-2008-3275
CVE-2008-3525
CVE-2008-4210

Details

Updated kernel packages that resolve several security issues and fix
various bugs are now available for Red Hat Enterprise Linux 3.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update addresses the following security issues:

* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and
64-bit emulation. This could allow a local, unprivileged user to prepare
and run a specially-crafted binary which would use this deficiency to leak
uninitialized and potentially sensitive data. (CVE-2008-0598, Important)

* a possible kernel memory leak was found in the Linux kernel Simple
Internet Transition (SIT) INET6 implementation. This could allow a local,
unprivileged user to cause a denial of service. (CVE-2008-2136, Important)

* missing capability checks were found in the SBNI WAN driver which could
allow a local user to bypass intended capability restrictions.
(CVE-2008-3525, Important)

* the do_truncate() and generic_file_splice_write() functions did not clear
the setuid and setgid bits. This could allow a local, unprivileged user to
obtain access to privileged information. (CVE-2008-4210, Important)

* a buffer overflow flaw was found in Integrated Services Digital Network
(ISDN) subsystem. A local, unprivileged user could use this flaw to cause a
denial of service. (CVE-2007-6063, Moderate)

* multiple NULL pointer dereferences were found in various Linux kernel
network drivers. These drivers were missing checks for terminal validity,
which could allow privilege escalation. (CVE-2008-2812, Moderate)

* a deficiency was found in the Linux kernel virtual filesystem (VFS)
implementation. This could allow a local, unprivileged user to attempt file
creation within deleted directories, possibly causing a denial of service.
(CVE-2008-3275, Moderate)

This update also fixes the following bugs:

* the incorrect kunmap function was used in nfs_xdr_readlinkres. kunmap()
was used where kunmap_atomic() should have been. As a consequence, if an
NFSv2 or NFSv3 server exported a volume containing a symlink which included
a path equal to or longer than the local system's PATH_MAX, accessing the
link caused a kernel oops. This has been corrected in this update.

* mptctl_gettargetinfo did not check if pIoc3 was NULL before using it as a
pointer. This caused a kernel panic in mptctl_gettargetinfo in some
circumstances. A check has been added which prevents this.

* lost tick compensation code in the timer interrupt routine triggered
without apparent cause. When running as a fully-virtualized client, this
spurious triggering caused the 64-bit version of Red Hat Enterprise Linux 3
to present highly inaccurate times. With this update the lost tick
compensation code is turned off when the operating system is running as a
fully-virtualized client under Xen or VMWare®.

All Red Hat Enterprise Linux 3 users should install this updated kernel
which addresses these vulnerabilities and fixes these bugs.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
kernel-2.4.21-58.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7c6576daafb002f060f1c02b2eb82199
 
IA-32:
kernel-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 10ce0bd698e40ee8962558e0483ce638
kernel-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: e04932430902c6b7f5fa1e007e7a4f6d
kernel-BOOT-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: fe1080e2dd526fbec2d246a289a98de0
kernel-doc-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6a28126bdfc6c1c20cb70d44087e100b
kernel-hugemem-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: eaeefc3d051289c3bf22a994fc61db41
kernel-hugemem-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 28311643b21d7a29eb43c89fad3bed0c
kernel-smp-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 66a4c22852c3d712a90189531260fb6b
kernel-smp-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: b30824cf44307d5de0f623d4acde2583
kernel-smp-unsupported-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 91933f1fe4e8b0d1dbb5e837880b68a5
kernel-smp-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1ae81a5353a88b197e6c9979e42d4f85
kernel-source-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: d2d3e73f7ed02488af39cae69684f2fc
kernel-unsupported-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7b57ec05f49b1a658fd3ac8d9893cfc1
kernel-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6f9589cf3a37acb7e0aa10c2a757624f
 
x86_64:
kernel-2.4.21-58.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 03c2fcfa8e25cf0ddb36ea9ef7712305
kernel-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: eba23811c55123235d91771cf169d874
kernel-doc-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 51cc47e7e7cbb7f042ee03ee55f7326f
kernel-smp-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 06249c48e4634c224e8da2b9c5d36f41
kernel-smp-unsupported-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6ae67b07f3bdd7b39045cf664025fbeb
kernel-source-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b8bf12915fde5f772b5ceb00d90ca2ee
kernel-unsupported-2.4.21-58.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2b2220a015c41f4a2f525b10212d675d
kernel-unsupported-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1152a3275a6a3c726dbaac8074a49da8
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
kernel-2.4.21-58.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7c6576daafb002f060f1c02b2eb82199
 
IA-32:
kernel-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 10ce0bd698e40ee8962558e0483ce638
kernel-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: e04932430902c6b7f5fa1e007e7a4f6d
kernel-BOOT-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: fe1080e2dd526fbec2d246a289a98de0
kernel-doc-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6a28126bdfc6c1c20cb70d44087e100b
kernel-hugemem-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: eaeefc3d051289c3bf22a994fc61db41
kernel-hugemem-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 28311643b21d7a29eb43c89fad3bed0c
kernel-smp-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 66a4c22852c3d712a90189531260fb6b
kernel-smp-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: b30824cf44307d5de0f623d4acde2583
kernel-smp-unsupported-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 91933f1fe4e8b0d1dbb5e837880b68a5
kernel-smp-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1ae81a5353a88b197e6c9979e42d4f85
kernel-source-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: d2d3e73f7ed02488af39cae69684f2fc
kernel-unsupported-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7b57ec05f49b1a658fd3ac8d9893cfc1
kernel-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6f9589cf3a37acb7e0aa10c2a757624f
 
IA-64:
kernel-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: d50083218fbb00babdb29f02c88fd7fd
kernel-doc-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: dbe43a9f07243b8918123768d248c44b
kernel-source-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 92c772bcc2e46bc5b94830bdb6564f17
kernel-unsupported-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b33c658f2bcc07477287568121693551
 
PPC:
kernel-2.4.21-58.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: f86f04f4407cca2113fe9f7e5aaa736c
kernel-2.4.21-58.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1996ee824f3faa5843bba62e8ae48eda
kernel-doc-2.4.21-58.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: eac74de575b55f61a862b767d9bc9136
kernel-source-2.4.21-58.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6a6054d0025034a181f316039b5d88d0
kernel-unsupported-2.4.21-58.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: e440e4382aed044e9d4ee3bc6d3b6122
kernel-unsupported-2.4.21-58.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7400d930ff0a95e048e47e3c5aab74fe
 
s390:
kernel-2.4.21-58.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: c69887ac0235f1d7f36a5ff1f605b02d
kernel-doc-2.4.21-58.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: b043e37460e64e3a6bb5580a4577a7f7
kernel-source-2.4.21-58.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: b78471399e682c8cdb2cc8d5d81fd8bd
kernel-unsupported-2.4.21-58.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9746d9f9178a92ccc9cf808c173eca08
 
s390x:
kernel-2.4.21-58.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 51dea094f7b4deb7cc0bde05c49d2653
kernel-doc-2.4.21-58.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 5ef8a7582b5b24cdbf3e788291eda585
kernel-source-2.4.21-58.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7710c82a7a9772cdd2469e13b6fbe962
kernel-unsupported-2.4.21-58.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: d0ed8badbe97afca884e49996dd30f66
 
x86_64:
kernel-2.4.21-58.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 03c2fcfa8e25cf0ddb36ea9ef7712305
kernel-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: eba23811c55123235d91771cf169d874
kernel-doc-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 51cc47e7e7cbb7f042ee03ee55f7326f
kernel-smp-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 06249c48e4634c224e8da2b9c5d36f41
kernel-smp-unsupported-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6ae67b07f3bdd7b39045cf664025fbeb
kernel-source-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b8bf12915fde5f772b5ceb00d90ca2ee
kernel-unsupported-2.4.21-58.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2b2220a015c41f4a2f525b10212d675d
kernel-unsupported-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1152a3275a6a3c726dbaac8074a49da8
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
kernel-2.4.21-58.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7c6576daafb002f060f1c02b2eb82199
 
IA-32:
kernel-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 10ce0bd698e40ee8962558e0483ce638
kernel-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: e04932430902c6b7f5fa1e007e7a4f6d
kernel-BOOT-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: fe1080e2dd526fbec2d246a289a98de0
kernel-doc-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6a28126bdfc6c1c20cb70d44087e100b
kernel-hugemem-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: eaeefc3d051289c3bf22a994fc61db41
kernel-hugemem-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 28311643b21d7a29eb43c89fad3bed0c
kernel-smp-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 66a4c22852c3d712a90189531260fb6b
kernel-smp-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: b30824cf44307d5de0f623d4acde2583
kernel-smp-unsupported-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 91933f1fe4e8b0d1dbb5e837880b68a5
kernel-smp-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1ae81a5353a88b197e6c9979e42d4f85
kernel-source-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: d2d3e73f7ed02488af39cae69684f2fc
kernel-unsupported-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7b57ec05f49b1a658fd3ac8d9893cfc1
kernel-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6f9589cf3a37acb7e0aa10c2a757624f
 
IA-64:
kernel-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: d50083218fbb00babdb29f02c88fd7fd
kernel-doc-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: dbe43a9f07243b8918123768d248c44b
kernel-source-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 92c772bcc2e46bc5b94830bdb6564f17
kernel-unsupported-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b33c658f2bcc07477287568121693551
 
x86_64:
kernel-2.4.21-58.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 03c2fcfa8e25cf0ddb36ea9ef7712305
kernel-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: eba23811c55123235d91771cf169d874
kernel-doc-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 51cc47e7e7cbb7f042ee03ee55f7326f
kernel-smp-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 06249c48e4634c224e8da2b9c5d36f41
kernel-smp-unsupported-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6ae67b07f3bdd7b39045cf664025fbeb
kernel-source-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b8bf12915fde5f772b5ceb00d90ca2ee
kernel-unsupported-2.4.21-58.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2b2220a015c41f4a2f525b10212d675d
kernel-unsupported-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1152a3275a6a3c726dbaac8074a49da8
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
kernel-2.4.21-58.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7c6576daafb002f060f1c02b2eb82199
 
IA-32:
kernel-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 10ce0bd698e40ee8962558e0483ce638
kernel-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: e04932430902c6b7f5fa1e007e7a4f6d
kernel-BOOT-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: fe1080e2dd526fbec2d246a289a98de0
kernel-doc-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6a28126bdfc6c1c20cb70d44087e100b
kernel-hugemem-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: eaeefc3d051289c3bf22a994fc61db41
kernel-hugemem-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 28311643b21d7a29eb43c89fad3bed0c
kernel-smp-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 66a4c22852c3d712a90189531260fb6b
kernel-smp-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: b30824cf44307d5de0f623d4acde2583
kernel-smp-unsupported-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 91933f1fe4e8b0d1dbb5e837880b68a5
kernel-smp-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1ae81a5353a88b197e6c9979e42d4f85
kernel-source-2.4.21-58.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: d2d3e73f7ed02488af39cae69684f2fc
kernel-unsupported-2.4.21-58.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7b57ec05f49b1a658fd3ac8d9893cfc1
kernel-unsupported-2.4.21-58.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6f9589cf3a37acb7e0aa10c2a757624f
 
IA-64:
kernel-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: d50083218fbb00babdb29f02c88fd7fd
kernel-doc-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: dbe43a9f07243b8918123768d248c44b
kernel-source-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 92c772bcc2e46bc5b94830bdb6564f17
kernel-unsupported-2.4.21-58.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b33c658f2bcc07477287568121693551
 
x86_64:
kernel-2.4.21-58.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 03c2fcfa8e25cf0ddb36ea9ef7712305
kernel-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: eba23811c55123235d91771cf169d874
kernel-doc-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 51cc47e7e7cbb7f042ee03ee55f7326f
kernel-smp-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 06249c48e4634c224e8da2b9c5d36f41
kernel-smp-unsupported-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6ae67b07f3bdd7b39045cf664025fbeb
kernel-source-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b8bf12915fde5f772b5ceb00d90ca2ee
kernel-unsupported-2.4.21-58.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2b2220a015c41f4a2f525b10212d675d
kernel-unsupported-2.4.21-58.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1152a3275a6a3c726dbaac8074a49da8
 

Bugs fixed (see bugzilla for more information)

392101 - CVE-2007-6063 Linux Kernel isdn_net_setcfg buffer overflow
433938 - CVE-2008-0598 kernel: linux x86_64 ia32 emulation leaks uninitialized data
438758 - wrong kunmap call in nfs_xdr_readlinkres
446031 - CVE-2008-2136 kernel: sit memory leak
453419 - CVE-2008-2812 kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code
457858 - CVE-2008-3275 Linux kernel local filesystem DoS
460401 - CVE-2008-3525 kernel: missing capability checks in sbni_ioctl()
463661 - CVE-2008-4210 kernel: open() call allows setgid bit when user is not in new file's group


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/