CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
10.1%
An issue was discovered in drivers/media/platform/vivid in the Linux kernel
through 5.3.8. It is exploitable for privilege escalation on some Linux
distributions where local users have /dev/video0 access, but only if the
driver happens to be loaded. There are multiple race conditions during
streaming stopping in this driver (part of the V4L2 subsystem). These
issues are caused by wrong mutex locking in
vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(),
sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of
these race conditions leads to a use-after-free.
Author | Note |
---|---|
tyhicks | This rarely used driver module cannot be loaded by an unprivileged user so the impact is lessened |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | <Β 4.15.0-88.88 | UNKNOWN |
ubuntu | 19.10 | noarch | linux | <Β 5.3.0-40.32 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | <Β 4.4.0-173.203 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | <Β 4.15.0-1060.62 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-aws | <Β 5.3.0-1011.12 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | <Β 4.4.0-1061.65 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | <Β 4.4.0-1101.112 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.0 | <Β 5.0.0-1024.27~18.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | <Β 4.15.0-1060.62~16.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure | <Β 5.0.0-1029.31~18.04.1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2019-18683
lore.kernel.org/lkml/[email protected]/
nvd.nist.gov/vuln/detail/CVE-2019-18683
security-tracker.debian.org/tracker/CVE-2019-18683
ubuntu.com/security/notices/USN-4254-1
ubuntu.com/security/notices/USN-4254-2
ubuntu.com/security/notices/USN-4258-1
ubuntu.com/security/notices/USN-4284-1
ubuntu.com/security/notices/USN-4287-1
ubuntu.com/security/notices/USN-4287-2
www.cve.org/CVERecord?id=CVE-2019-18683
www.openwall.com/lists/oss-security/2019/11/02/1
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
10.1%