QID 198672
Date Published: 2022-03-01
QID 198672: Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5302-1)
The cgroups implementation in thelinux kernel did not properly restrict access to the cgroups v1release_agent feature.
The marvell wifi-ex usb device driverin the linux kernel did not properly handle some error conditions.
The f2fs file system implementation in thelinux kernel did not properly validate inode types while performing garbagecollection.
The transparent inter-process communication(tipc) protocol implementation in the linux kernel contained a stack-basedbuffer overflow.
The nfs implementation in the linux kernel did notproperly handle requests to open a directory on a regular file.
The yam ax.
A local attacker could use this to gainadministrative privileges.
Aphysically proximate attacker could use this to cause a denial of service(system crash).
An attacker could use this to construct a malicious f2fs imagethat, when mounted and operated on, could cause a denial of service (systemcrash).
A remote attacker could use this to cause a denial ofservice (system crash) for systems that have a tipc bearer configured.
A localattacker could use this to expose sensitive information (kernel memory).
25 device driver in the linux kernel didnot properly deallocate memory in some error conditions.
A local privilegedattacker could use this to cause a denial of service (kernel memoryexhaustion).
- USN-5302-1 -
ubuntu.com/security/notices/USN-5302-1
CVEs related to QID 198672
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| USN-5302-1 | Ubuntu Linux |
|