Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7097

Опубликовано: 16 окт. 2016
Источник: debian

Описание

The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.7.8-1package
linuxfixed3.16.39-1jessiepackage

Примечания

  • http://www.spinics.net/lists/linux-fsdevel/msg98328.html

  • http://marc.info/?l=linux-fsdevel&m=147162313630259&w=2

  • https://bugzilla.redhat.com/show_bug.cgi?id=1368938

  • Fixed by: https://git.kernel.org/linus/073931017b49d9458aa351605b43a7e34598caef

Связанные уязвимости

CVSS3: 4.4
ubuntu
больше 8 лет назад

The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.

CVSS3: 4.4
redhat
около 9 лет назад

The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.

CVSS3: 4.4
nvd
больше 8 лет назад

The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.

CVSS3: 4.4
github
около 3 лет назад

The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.

oracle-oval
почти 8 лет назад

ELSA-2017-3596: Unbreakable Enterprise kernel security update (IMPORTANT)