QID 198667

Date Published: 2022-02-21

QID 198667: Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5294-1)

The packet network protocol implementation in thelinux kernel contained a double-free vulnerability.
The usb gadget subsystem in the linuxkernel did not properly restrict the size of control requests for certaingadget types, leading to possible out of bounds reads or writes.
Race condition in the unix domain socketimplementation in the linux kernel that could result in a read-after-free.
The xfs file system implementation in thelinux kernel did not calculate size correctly when pre-allocating space insome situations.
The nfc controller interface (nci) implementation inthe linux kernel contained a race condition, leading to a use-after-freevulnerability.
The aquantia aqtion ethernet devicedriver in the linux kernel did not properly validate meta-data coming fromthe device.
The intel i915 graphics driver inthe linux kernel did not perform a gpu tlb flush in some situations.
The vmware virtual gpu driver in the linux kerneldid not properly handle certain failure conditions, leading to a staleentry in the file descriptor table.

A local attacker coulduse this to cause a denial of service (system crash) or possibly executearbitrary code.
A localattacker could use this to cause a denial of service (system crash) orpossibly execute arbitrary code.
A local attacker could use this to cause a denial of service (system crash)or possibly execute arbitrary code.
A local attacker could use this to expose sensitiveinformation.
A local attacker could use this to cause a denial of service(system crash) or possibly execute arbitrary code.
A local attacker who can control an emulated device can usethis to cause a denial of service (system crash) or possibly executearbitrary code.
Alocal attacker could use this to cause a denial of service or possiblyexecute arbitrary code.
A local attacker could use this toexpose sensitive information or possibly gain administrative privileges.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Refer to Ubuntu security advisory USN-5294-1 for updates and patch information.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    USN-5294-1 Ubuntu Linux URL Logo ubuntu.com/security/notices/USN-5294-1