QID 198616

Date Published: 2022-01-10

QID 198616: Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5207-1)

The hugetlb implementation in the linux kerneldid not perform tlb flushes under certain conditions.
The ebpf implementation in the linux kernelcontained a race condition around read-only maps.
The firedtv firewire driver in the linux kerneldid not properly perform bounds checking in some situations.
The tipc protocol implementation in the linux kerneldid not properly validate msg_crypto messages in some situations.

A local attackercould use this to leak or alter data from other processes that use hugepages.
A privileged attackercould use this to modify read-only maps.
A localattacker could use this to cause a denial of service (system crash) orpossibly execute arbitrary code.
Anattacker could use this to cause a denial of service (system crash) orpossibly execute arbitrary code.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Refer to Ubuntu security advisory USN-5207-1 for updates and patch information.
    Vendor References

    CVEs related to QID 198616

    Software Advisories
    Advisory ID Software Component Link
    USN-5207-1 Ubuntu Linux URL Logo ubuntu.com/security/notices/USN-5207-1