Hi @Charly
As you read in the article, no detail on how an attacker can exploit this CVE has been shared.
So it's hard to tell whether Ubuntu Touch is vulnerable or not.
If it requires physical access to the device we're already more vulnerable due to the bootloader.
Also if I understand correctly, the best project to ask questions about the kernel for halium devices is the halium project.
Once the kernel is fixed there the porter can merge it to the port.
Or, the porter can implement the fix, but (again IIUC) it's a very device specific issue.
I would love to come up with a way to track CVE and analyze them for each device but I didn't find a good way to do it efficiently.