[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-7097Date: (C)2016-10-18   (M)2024-04-04


The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 4.4CVSS Score : 3.6
Exploit Score: 1.8Exploit Score: 3.9
Impact Score: 2.5Impact Score: 4.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: LOWAvailability: NONE
Integrity: LOW 
Availability: NONE 
  
Reference:
SECTRACK-1038201
BID-92659
RHSA-2017:0817
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
USN-3146-1
USN-3146-2
USN-3147-1
http://www.spinics.net/lists/linux-fsdevel/msg98328.html
http://marc.info/?l=linux-fsdevel&m=147162313630259&w=2
http://www.openwall.com/lists/oss-security/2016/08/26/3
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073931017b49d9458aa351605b43a7e34598caef
https://bugzilla.redhat.com/show_bug.cgi?id=1368938
https://github.com/torvalds/linux/commit/073931017b49d9458aa351605b43a7e34598caef
https://source.android.com/security/bulletin/2017-04-01
https://support.f5.com/csp/article/K31603170?utm_source=f5support&%3Butm_medium=RSS

CWE    1
CWE-285
OVAL    30
oval:org.secpod.oval:def:111959
oval:org.secpod.oval:def:111963
oval:org.secpod.oval:def:703374
oval:org.secpod.oval:def:703377
...

© SecPod Technologies