{"id":"UBUNTU-CVE-2016-10156","details":"A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.","modified":"2025-07-16T07:02:11.721659Z","published":"2017-01-23T07:59:00Z","withdrawn":"2025-07-18T16:43:43Z","upstream":["CVE-2016-10156"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-10156"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-10156"}],"affected":[{"package":{"name":"systemd","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/systemd@229-4ubuntu16?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"229-4ubuntu16"}]}],"versions":["225-1ubuntu9","227-2ubuntu1","227-2ubuntu2","228-1ubuntu2","228-2ubuntu1","228-2ubuntu2","228-3ubuntu1","228-4ubuntu1","228-4ubuntu2","228-5ubuntu1","228-5ubuntu2","228-5ubuntu3","228-6ubuntu1","229-1ubuntu2","229-1ubuntu4","229-2ubuntu1","229-3ubuntu1","229-3ubuntu2","229-4ubuntu1","229-4ubuntu4","229-4ubuntu5","229-4ubuntu6","229-4ubuntu7","229-4ubuntu8","229-4ubuntu10","229-4ubuntu11","229-4ubuntu12","229-4ubuntu13"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libnss-myhostname","binary_version":"229-4ubuntu16"},{"binary_name":"libnss-myhostname-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"libnss-mymachines","binary_version":"229-4ubuntu16"},{"binary_name":"libnss-mymachines-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"libnss-resolve","binary_version":"229-4ubuntu16"},{"binary_name":"libnss-resolve-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"libpam-systemd","binary_version":"229-4ubuntu16"},{"binary_name":"libpam-systemd-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"libsystemd-dev","binary_version":"229-4ubuntu16"},{"binary_name":"libsystemd-dev-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"libsystemd0","binary_version":"229-4ubuntu16"},{"binary_name":"libsystemd0-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"libudev-dev","binary_version":"229-4ubuntu16"},{"binary_name":"libudev-dev-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"libudev1","binary_version":"229-4ubuntu16"},{"binary_name":"libudev1-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"libudev1-udeb","binary_version":"229-4ubuntu16"},{"binary_name":"libudev1-udeb-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"systemd","binary_version":"229-4ubuntu16"},{"binary_name":"systemd-container","binary_version":"229-4ubuntu16"},{"binary_name":"systemd-container-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"systemd-coredump","binary_version":"229-4ubuntu16"},{"binary_name":"systemd-coredump-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"systemd-dbg","binary_version":"229-4ubuntu16"},{"binary_name":"systemd-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"systemd-journal-remote","binary_version":"229-4ubuntu16"},{"binary_name":"systemd-journal-remote-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"systemd-sysv","binary_version":"229-4ubuntu16"},{"binary_name":"systemd-sysv-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"udev","binary_version":"229-4ubuntu16"},{"binary_name":"udev-dbgsym","binary_version":"229-4ubuntu16"},{"binary_name":"udev-udeb","binary_version":"229-4ubuntu16"},{"binary_name":"udev-udeb-dbgsym","binary_version":"229-4ubuntu16"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-10156.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}