Ubuntu 16.04 LTS : linux, linux-aws, linux-gke, linux-raspi2, linux-snapdragon vulnerabilities (USN-3234-1)

Medium Nessus Plugin ID 97778


The remote Ubuntu host is missing one or more security-related patches.


Ralf Spenneberg discovered that the ext4 implementation in the Linux kernel did not properly validate meta block groups. An attacker with physical access could use this to specially craft an ext4 image that causes a denial of service (system crash). (CVE-2016-10208)

It was discovered that the Linux kernel did not clear the setgid bit during a setxattr call on a tmpfs filesystem. A local attacker could use this to gain elevated group privileges. (CVE-2017-5551).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 97778

File Name: ubuntu_USN-3234-1.nasl

Version: $Revision: 3.3 $

Type: local

Agent: unix

Published: 2017/03/16

Modified: 2017/08/16

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.9

Temporal Score: 4

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 4.4

Temporal Score: 4.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-aws, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-gke, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-raspi2, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-snapdragon, p-cpe:/a:canonical:ubuntu_linux:linux-image-aws, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-gke, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2, p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon, cpe:/o:canonical:ubuntu_linux:16.04

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/03/15

Reference Information

CVE: CVE-2016-10208, CVE-2017-5551

OSVDB: 147763, 150899

USN: 3234-1