The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.
References
Link | Resource |
---|---|
https://github.com/torvalds/linux/commit/497de07d89c1410d76a15bec2bb41f24a2a89f31 | Issue Tracking Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1416126 | Issue Tracking Patch |
http://www.openwall.com/lists/oss-security/2017/01/21/3 | Mailing List Patch Third Party Advisory |
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6 | Release Notes Vendor Advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=497de07d89c1410d76a15bec2bb41f24a2a89f31 | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/95717 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038053 | |
http://www.debian.org/security/2017/dsa-3791 |
Configurations
Information
Published : 2017-02-05 22:59
Updated : 2019-10-02 17:03
NVD link : CVE-2017-5551
Mitre link : CVE-2017-5551
JSON object : View
CWE
Products Affected
linux
- linux_kernel