QID 198621
Date Published: 2022-01-10
QID 198621: Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5208-1)
The hugetlb implementation in the linux kerneldid not perform tlb flushes under certain conditions.
A race condition existed in the overlay file systemimplementation in the linux kernel.
The nfc subsystem in the linux kernel contained ause-after-free vulnerability in its nfc controller interface (nci)implementation.
An integer overflow could be triggered in the ebpfimplementation in the linux kernel when preallocating objects for stackmaps.
The kvm implementation for power8 processors in thelinux kernel did not properly keep track if a wakeup event could beresolved by a guest.
The tipc protocol implementation in the linux kerneldid not properly validate msg_crypto messages in some situations.
The isdn capi implementation in the linux kernelcontained a race condition in certain situations that could trigger anarray out-of-bounds bug.
A local attackercould use this to leak or alter data from other processes that use hugepages.
A local attacker could use this tocause a denial of service (system crash).
A local attacker could possibly use this to cause a denialof service (system crash) or execute arbitrary code.
A privileged local attacker could use this to cause a denial ofservice or possibly execute arbitrary code.
An attacker in a guest vm could possibly use this tocause a denial of service (host os crash).
Anattacker could use this to cause a denial of service (system crash) orpossibly execute arbitrary code.
A privileged local attacker could possibly usethis to cause a denial of service or execute arbitrary code.
- USN-5208-1 -
ubuntu.com/security/notices/USN-5208-1
CVEs related to QID 198621
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| USN-5208-1 | Ubuntu Linux |
|