vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-5551): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:L/AC:L/Au:N/C:P/I:P/A:N) | Jan 30, 2017 | Mar 18, 2017 | Apr 25, 2025 |
Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:N)
Published
Jan 30, 2017
Added
Mar 18, 2017
Modified
Apr 25, 2025
Description
Ralf Spenneberg discovered that the ext4 implementation in the Linux kernel
did not properly validate meta block groups. An attacker with physical
access could use this to specially craft an ext4 image that causes a denial
of service (system crash). (CVE-2016-10208)
It was discovered that the Linux kernel did not clear the setgid bit during
a setxattr call on a tmpfs filesystem. A local attacker could use this to
gain elevated group privileges. (CVE-2017-5551)
Solution(s)
ubuntu-upgrade-linux-image-4-10-0-27-genericubuntu-upgrade-linux-image-4-10-0-27-generic-lpaeubuntu-upgrade-linux-image-4-10-0-27-lowlatencyubuntu-upgrade-linux-image-4-4-0-1006-gkeubuntu-upgrade-linux-image-4-4-0-1009-awsubuntu-upgrade-linux-image-4-4-0-1048-raspi2ubuntu-upgrade-linux-image-4-4-0-1051-snapdragonubuntu-upgrade-linux-image-4-4-0-67-genericubuntu-upgrade-linux-image-4-4-0-67-generic-lpaeubuntu-upgrade-linux-image-4-4-0-67-lowlatencyubuntu-upgrade-linux-image-4-4-0-67-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-67-powerpc-smpubuntu-upgrade-linux-image-4-4-0-67-powerpc64-embubuntu-upgrade-linux-image-4-4-0-67-powerpc64-smpubuntu-upgrade-linux-image-4-8-0-1043-raspi2ubuntu-upgrade-linux-image-4-8-0-59-genericubuntu-upgrade-linux-image-4-8-0-59-generic-lpaeubuntu-upgrade-linux-image-4-8-0-59-lowlatencyubuntu-upgrade-linux-image-4-8-0-59-powerpc-e500mcubuntu-upgrade-linux-image-4-8-0-59-powerpc-smpubuntu-upgrade-linux-image-4-8-0-59-powerpc64-embubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon
References
- CVE-2017-5551
- https://attackerkb.com/topics/CVE-2017-5551
- DEBIAN-DSA-3791
- NVD-CVE-2017-5551
- UBUNTU-USN-3208-1
- UBUNTU-USN-3208-2
- UBUNTU-USN-3234-1
- UBUNTU-USN-3234-2
- UBUNTU-USN-3265-1
- UBUNTU-USN-3265-2
- UBUNTU-USN-3291-1
- UBUNTU-USN-3291-2
- UBUNTU-USN-3291-3
- UBUNTU-USN-3293-1
- UBUNTU-USN-3312-1
- UBUNTU-USN-3312-2
- UBUNTU-USN-3314-1
- UBUNTU-USN-3345-1
- UBUNTU-USN-3358-1
- UBUNTU-USN-3359-1
- UBUNTU-USN-3360-1
- UBUNTU-USN-3360-2
- UBUNTU-USN-3361-1
- UBUNTU-USN-3364-1
- UBUNTU-USN-3364-2
- UBUNTU-USN-3364-3
- UBUNTU-USN-3381-1
- UBUNTU-USN-3381-2
- UBUNTU-USN-3406-1
- UBUNTU-USN-3406-2
- UBUNTU-USN-3422-1
- UBUNTU-USN-3422-2
- UBUNTU-USN-3583-1
- UBUNTU-USN-3583-2
- UBUNTU-USN-3754-1
- UBUNTU-USN-4904-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.