CVE-2016-7097
Severity CVSS v4.0:
Pending analysis
Type:
CWE-285
Improper Authorization
Publication date:
16/10/2016
Last modified:
12/04/2025
Description
The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
Impact
Base Score 3.x
4.40
Severity 3.x
MEDIUM
Base Score 2.0
3.60
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.8.2 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073931017b49d9458aa351605b43a7e34598caef
- http://marc.info/?l=linux-fsdevel&m=147162313630259&w=2
- http://rhn.redhat.com/errata/RHSA-2017-0817.html
- http://www.openwall.com/lists/oss-security/2016/08/26/3
- http://www.securityfocus.com/bid/92659
- http://www.securitytracker.com/id/1038201
- http://www.spinics.net/lists/linux-fsdevel/msg98328.html
- http://www.ubuntu.com/usn/USN-3146-1
- http://www.ubuntu.com/usn/USN-3146-2
- http://www.ubuntu.com/usn/USN-3147-1
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2669
- https://bugzilla.redhat.com/show_bug.cgi?id=1368938
- https://github.com/torvalds/linux/commit/073931017b49d9458aa351605b43a7e34598caef
- https://source.android.com/security/bulletin/2017-04-01
- https://support.f5.com/csp/article/K31603170?utm_source=f5support&%3Butm_medium=RSS
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073931017b49d9458aa351605b43a7e34598caef
- http://marc.info/?l=linux-fsdevel&m=147162313630259&w=2
- http://rhn.redhat.com/errata/RHSA-2017-0817.html
- http://www.openwall.com/lists/oss-security/2016/08/26/3
- http://www.securityfocus.com/bid/92659
- http://www.securitytracker.com/id/1038201
- http://www.spinics.net/lists/linux-fsdevel/msg98328.html
- http://www.ubuntu.com/usn/USN-3146-1
- http://www.ubuntu.com/usn/USN-3146-2
- http://www.ubuntu.com/usn/USN-3147-1
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2669
- https://bugzilla.redhat.com/show_bug.cgi?id=1368938
- https://github.com/torvalds/linux/commit/073931017b49d9458aa351605b43a7e34598caef
- https://source.android.com/security/bulletin/2017-04-01
- https://support.f5.com/csp/article/K31603170?utm_source=f5support&%3Butm_medium=RSS



