The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
https://support.f5.com/csp/article/K31603170?utm_source=f5support&%3Butm_medium=RSS
https://source.android.com/security/bulletin/2017-04-01
https://github.com/torvalds/linux/commit/073931017b49d9458aa351605b43a7e34598caef
https://bugzilla.redhat.com/show_bug.cgi?id=1368938
https://access.redhat.com/errata/RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:1842
http://www.ubuntu.com/usn/USN-3147-1
http://www.ubuntu.com/usn/USN-3146-2
http://www.ubuntu.com/usn/USN-3146-1
http://www.spinics.net/lists/linux-fsdevel/msg98328.html
http://www.securitytracker.com/id/1038201
http://www.securityfocus.com/bid/92659
http://www.openwall.com/lists/oss-security/2016/08/26/3
http://rhn.redhat.com/errata/RHSA-2017-0817.html