QID 198653

Date Published: 2022-02-07

QID 198653: Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5265-1)

Use-after-free in the nouveau graphics driver ofthe linux kernel during device removal.
The bluetooth subsystem in the linux kernelcontained a use-after-free vulnerability.
A race condition existed in the bluetoothsubsystem of the linux kernel, leading to a use-after-free vulnerability.
The sctp protocol implementation in the linux kerneldid not properly verify vtags in some situations.
The ebpf implementation in the linux kernelcontained a race condition around read-only maps.
The nfs server implementation in the linux kernelcontained an out-of-bounds write vulnerability.
The kvm implementation in the linux kerneldid not properly handle exit events from amd secure encryptedvirtualization-encrypted state (sev-es) guest vms.
The nfc controller interface (nci) implementation inthe linux kernel contained a race condition, leading to a use-after-freevulnerability.
The amd radeon gpu driver in the linux kernel didnot properly validate writes in the debugfs file system.
The firedtv firewire driver in the linux kerneldid not properly perform bounds checking in some situations.

A privileged or physicallyproximate attacker could use this to cause a denial of service (systemcrash).
A local attacker could use thisto cause a denial of service (system crash) or possibly execute arbitrarycode.
Alocal attacker could use this to cause a denial of service (system crash)or possibly execute arbitrary code.
A remote attacker couldpossibly use this to cause a denial of service (connection disassociation).
A privileged attackercould use this to modify read-only maps.
A local attacker could usethis to cause a denial of service (system crash) or possibly executearbitrary code.
An attacker in a guestvm could use this to cause a denial of service (host kernel crash) orpossibly execute arbitrary code in the host kernel.
A local attacker could use this to cause a denial of service(system crash) or possibly execute arbitrary code.
A privilegedattacker could use this to cause a denial of service (system crash) orpossibly execute arbitrary code.
A localattacker could use this to cause a denial of service (system crash) orpossibly execute arbitrary code.

  • CVSS V3 rated as High - 6.7 severity.
  • CVSS V2 rated as Medium - 4.7 severity.
  • Solution
    Refer to Ubuntu security advisory USN-5265-1 for updates and patch information.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    USN-5265-1 Ubuntu Linux URL Logo ubuntu.com/security/notices/USN-5265-1