QID 198673

Date Published: 2022-03-01

QID 198673: Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5295-2)

The packet network protocol implementation in thelinux kernel contained a double-free vulnerability.
Race condition in the unix domain socketimplementation in the linux kernel that could result in a read-after-free.
The xfs file system implementation in thelinux kernel did not calculate size correctly when pre-allocating space insome situations.
The intel i915 graphics driver inthe linux kernel did not perform a gpu tlb flush in some situations.
The vmware virtual gpu driver in the linux kerneldid not properly handle certain failure conditions, leading to a staleentry in the file descriptor table.

A local attacker coulduse this to cause a denial of service (system crash) or possibly executearbitrary code.
A local attacker could use this to cause a denial of service (system crash)or possibly execute arbitrary code.
A local attacker could use this to expose sensitiveinformation.
Alocal attacker could use this to cause a denial of service or possiblyexecute arbitrary code.
A local attacker could use this toexpose sensitive information or possibly gain administrative privileges.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Refer to Ubuntu security advisory USN-5295-2 for updates and patch information.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    USN-5295-2 Ubuntu Linux URL Logo ubuntu.com/security/notices/USN-5295-2