CVE-2017-5551

MEDIUM

Linux kernel <4.9.6 - Privilege Escalation

Title source: llm
STIX 2.1

Description

The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.

References (8)

Core 8
Core References
Mailing List, Patch, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/01/21/3
Release Notes, Vendor Advisory x_refsource_confirm
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/95717
Issue Tracking, Patch x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1416126
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2017/dsa-3791
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1038053

Scores

CVSS v3 4.4
EPSS 0.0006
EPSS Percentile 19.7%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Details

Status published
Products (1)
linux/linux_kernel < 4.9.5
Published Feb 06, 2017
Tracked Since Feb 18, 2026