PatchSiren cyber security CVE debrief
CVE-2017-5551 Linux CVE debrief
CVE-2017-5551 is a Linux kernel local privilege issue affecting systems running kernel versions before 4.9.6. The flaw is in simple_set_acl in fs/posix_acl.c and can preserve the setgid bit during a setxattr call on tmpfs. In practical terms, a local user may be able to gain group privileges when a restrictive setgid program is present. The record notes this is an incomplete fix for CVE-2016-7097.
- Vendor
- Linux
- Product
- CVE-2017-5551
- CVSS
- MEDIUM 4.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-06
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-06
- Advisory updated
- 2026-05-13
Who should care
Linux administrators, distro maintainers, and security teams responsible for multi-user systems that run affected kernel versions, especially where tmpfs is used and local users can interact with ACL/xattr workflows or setgid programs.
Technical summary
NVD describes the issue as a Linux kernel vulnerability with CVSS 3.0 vector AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N. The affected CPE range is Linux kernel versions up to and including 4.9.5. The bug occurs in simple_set_acl, where a setxattr operation on tmpfs can preserve the setgid bit rather than clearing it as intended. The vulnerability is explicitly described as resulting from an incomplete fix for CVE-2016-7097.
Defensive priority
Medium. The vulnerability requires local access and is not rated for availability impact, but it can still affect privilege boundaries on multi-user Linux systems and should be patched promptly on exposed hosts.
Recommended defensive actions
- Update to Linux kernel 4.9.6 or a vendor build that backports the fix.
- Verify your distribution’s security advisory or kernel changelog to confirm the patch is included.
- Prioritize remediation on multi-user systems where untrusted local accounts exist.
- Review systems that rely on tmpfs, ACLs, or setgid workflows for exposure to this class of issue.
- If immediate patching is not possible, reduce unnecessary local user access until the fixed kernel is deployed.
Evidence notes
The supplied NVD record lists Linux kernel versions through 4.9.5 as vulnerable and cites the upstream kernel commit and the Linux 4.9.6 changelog as remediation references. The description states the flaw preserves the setgid bit during setxattr on tmpfs and identifies it as an incomplete fix for CVE-2016-7097. NVD also classifies the weakness as NVD-CWE-noinfo, so no more specific CWE should be inferred beyond the source record.
Official resources
-
CVE-2017-5551 CVE record
CVE.org
-
CVE-2017-5551 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
- Source reference
-
Mitigation or vendor reference
[email protected] - Release Notes, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch
CVE-2017-5551 was published on 2017-02-06. The supplied record shows a later metadata modification on 2026-05-13, but that does not change the original vulnerability publication date. Remediation references point to the upstream Linux fix/4