CVE-2016-7097

4.4 MEDIUM
Published: October 16, 2016 Modified: May 06, 2026
View on NVD

Description

The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/08/26/3
Source: secalert@redhat.com
Mailing List
http://www.securityfocus.com/bid/92659
Source: secalert@redhat.com
http://www.spinics.net/lists/linux-fsdevel/msg98328.html
Source: secalert@redhat.com
Patch Third Party Advisory
http://www.ubuntu.com/usn/USN-3146-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-3146-2
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-3147-1
Source: secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1368938
Source: secalert@redhat.com
Issue Tracking Third Party Advisory
http://marc.info/?l=linux-fsdevel&m=147162313630259&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://rhn.redhat.com/errata/RHSA-2017-0817.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2016/08/26/3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.securityfocus.com/bid/92659
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id/1038201
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.spinics.net/lists/linux-fsdevel/msg98328.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://www.ubuntu.com/usn/USN-3146-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-3146-2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-3147-1
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2017:1842
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2017:2077
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2017:2669
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=1368938
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://github.com/torvalds/linux/commit/073931017b49d9458aa351605b43a7e34598caef
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://source.android.com/security/bulletin/2017-04-01
Source: af854a3a-2127-422b-91ae-364da2661108

34 reference(s) from NVD

Quick Stats

CVSS v3 Score
4.4 / 10.0
EPSS (Exploit Probability)
0.1%
16th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

linux