QID 198672

Date Published: 2022-03-01

QID 198672: Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5302-1)

The cgroups implementation in thelinux kernel did not properly restrict access to the cgroups v1release_agent feature.
The marvell wifi-ex usb device driverin the linux kernel did not properly handle some error conditions.
The f2fs file system implementation in thelinux kernel did not properly validate inode types while performing garbagecollection.
The transparent inter-process communication(tipc) protocol implementation in the linux kernel contained a stack-basedbuffer overflow.
The nfs implementation in the linux kernel did notproperly handle requests to open a directory on a regular file.
The yam ax.

A local attacker could use this to gainadministrative privileges.
Aphysically proximate attacker could use this to cause a denial of service(system crash).
An attacker could use this to construct a malicious f2fs imagethat, when mounted and operated on, could cause a denial of service (systemcrash).
A remote attacker could use this to cause a denial ofservice (system crash) for systems that have a tipc bearer configured.
A localattacker could use this to expose sensitive information (kernel memory).
25 device driver in the linux kernel didnot properly deallocate memory in some error conditions.
A local privilegedattacker could use this to cause a denial of service (kernel memoryexhaustion).

  • CVSS V3 rated as Medium - 5.5 severity.
  • CVSS V2 rated as Low - 1.9 severity.
  • Solution
    Refer to Ubuntu security advisory USN-5302-1 for updates and patch information.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    USN-5302-1 Ubuntu Linux URL Logo ubuntu.com/security/notices/USN-5302-1