QID 198728

Date Published: 2022-04-04

QID 198728: Ubuntu Security Notification for Linux kernel (Intel IOTG) Vulnerabilities (USN-5362-1)

The linux kernel incorrectly handled networkoffload functionality.
Hardware mitigations added by arm to theirprocessors to address spectre-bti were insufficient.
The bpf verifier in the linux kernel did notproperly restrict pointer types in certain situations.
The linux kernel incorrectly handled unixpipes.
The cgroups implementation in thelinux kernel did not properly restrict access to the cgroups v1release_agent feature.
The file system contextfunctionality in the linux kernel contained an integer underflowvulnerability, leading to an out-of-bounds write.
Hardware mitigations added by intel to theirprocessors to address spectre-bti were insufficient.
Race condition in the unix domain socketimplementation in the linux kernel that could result in a read-after-free.
The nfs server implementation in the linux kernelcontained an out-of-bounds write vulnerability.
The xfs file system implementation in thelinux kernel did not calculate size correctly when pre-allocating space insome situations.
The amd radeon gpu driver in the linux kernel didnot properly validate writes in the debugfs file system.
The intel i915 graphics driver inthe linux kernel did not perform a gpu tlb flush in some situations.
The transparent inter-process communication(tipc) protocol implementation in the linux kernel contained a stack-basedbuffer overflow.
The kvm implementation for s390 systems in the linuxkernel did not properly prevent memory operations on pvm guests that werein non-protected mode.
The icmpv6 implementation in the linux kernel didnot properly deallocate memory in certain situations.
The vmware virtual gpu driver in the linux kerneldid not properly handle certain failure conditions, leading to a staleentry in the file descriptor table.

A local attacker could use this to cause a denial ofservice or possibly execute arbitrary code.
A local attacker couldpotentially use this to expose sensitive information.
A local attackercould use this to cause a denial of service (system crash) or possiblyexecute arbitrary code.
A local attacker could potentially use this to modify any file thatcould be opened for reading.
A local attacker could use this to gainadministrative privileges.
A local attacker coulduse this to cause a denial of service (system crash) or execute arbitrarycode.
A local attacker couldpotentially use this to expose sensitive information.
A local attacker could use this to cause a denial of service (system crash)or possibly execute arbitrary code.
A local attacker could usethis to cause a denial of service (system crash) or possibly executearbitrary code.
A local attacker could use this to expose sensitiveinformation.
A privilegedattacker could use this to cause a denial of service (system crash) orpossibly execute arbitrary code.
Alocal attacker could use this to cause a denial of service or possiblyexecute arbitrary code.
A remote attacker could use this to cause a denial ofservice (system crash) for systems that have a tipc bearer configured.
A local attacker could use this to obtainunauthorized memory write access.
A remote attackercould possibly use this to cause a denial of service (memory exhaustion).
A local attacker could use this toexpose sensitive information or possibly gain administrative privileges.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution
    Refer to Ubuntu security advisory USN-5362-1 for updates and patch information.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    USN-5362-1 Ubuntu Linux URL Logo ubuntu.com/security/notices/USN-5362-1