4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
3.6 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:P/A:N
Linux kernel is vulnerable to privilege escalation attacks. The file system implementation in the Linux kernel preserves the setgid bit during a setxattr call. This could allow a local user to gain elevated privileges via certain setgid applications.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073931017b49d9458aa351605b43a7e34598caef
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073931017b49d9458aa351605b43a7e34598caef
marc.info/?l=linux-fsdevel&m=147162313630259&w=2
marc.info/?l=linux-fsdevel&m=147162313630259&w=2
rhn.redhat.com/errata/RHSA-2017-0817.html
rhn.redhat.com/errata/RHSA-2017-0817.html
www.openwall.com/lists/oss-security/2016/08/26/3
www.openwall.com/lists/oss-security/2016/08/26/3
www.securityfocus.com/bid/92659
www.securityfocus.com/bid/92659
www.securitytracker.com/id/1038201
www.securitytracker.com/id/1038201
www.spinics.net/lists/linux-fsdevel/msg98328.html
www.spinics.net/lists/linux-fsdevel/msg98328.html
www.ubuntu.com/usn/USN-3146-1
www.ubuntu.com/usn/USN-3146-1
www.ubuntu.com/usn/USN-3146-2
www.ubuntu.com/usn/USN-3146-2
www.ubuntu.com/usn/USN-3147-1
www.ubuntu.com/usn/USN-3147-1
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html
access.redhat.com/errata/RHSA-2017:0817
access.redhat.com/errata/RHSA-2017:1842
access.redhat.com/errata/RHSA-2017:1842
access.redhat.com/errata/RHSA-2017:2077
access.redhat.com/errata/RHSA-2017:2077
access.redhat.com/errata/RHSA-2017:2669
access.redhat.com/errata/RHSA-2017:2669
access.redhat.com/security/cve/CVE-2016-7097
access.redhat.com/security/cve/CVE-2017-5551
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1325766
bugzilla.redhat.com/show_bug.cgi?id=1368938
bugzilla.redhat.com/show_bug.cgi?id=1368938
bugzilla.redhat.com/show_bug.cgi?id=847106
github.com/torvalds/linux/commit/073931017b49d9458aa351605b43a7e34598caef
github.com/torvalds/linux/commit/073931017b49d9458aa351605b43a7e34598caef
source.android.com/security/bulletin/2017-04-01
source.android.com/security/bulletin/2017-04-01
support.f5.com/csp/article/K31603170?utm_source=f5support&%3Butm_medium=RSS
4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
3.6 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:P/A:N