QID 198618
Date Published: 2022-01-10
QID 198618: Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5210-1)
The hugetlb implementation in the linux kerneldid not perform tlb flushes under certain conditions.
The linux kernel did not properly enforce certaintypes of entries in the secure boot forbidden signature database (aka dbx)protection mechanism.
A race condition existed in the overlay file systemimplementation in the linux kernel.
The nfc subsystem in the linux kernel contained ause-after-free vulnerability in its nfc controller interface (nci)implementation.
An integer overflow could be triggered in the ebpfimplementation in the linux kernel when preallocating objects for stackmaps.
The kvm implementation for power8 processors in thelinux kernel did not properly keep track if a wakeup event could beresolved by a guest.
The isdn capi implementation in the linux kernelcontained a race condition in certain situations that could trigger anarray out-of-bounds bug.
A local attackercould use this to leak or alter data from other processes that use hugepages.
An attacker could use this to bypass uefi secure bootrestrictions.
A local attacker could use this tocause a denial of service (system crash).
A local attacker could possibly use this to cause a denialof service (system crash) or execute arbitrary code.
A privileged local attacker could use this to cause a denial ofservice or possibly execute arbitrary code.
An attacker in a guest vm could possibly use this tocause a denial of service (host os crash).
A privileged local attacker could possibly usethis to cause a denial of service or execute arbitrary code.
- USN-5210-1 -
ubuntu.com/security/notices/USN-5210-1
CVEs related to QID 198618
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| USN-5210-1 | Ubuntu Linux |
|