CVE-2010-2963

Priority
Medium
Description
drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L)
implementation in the Linux kernel before 2.6.36 on 64-bit platforms does
not validate the destination of a memory copy operation, which allows local
users to write to arbitrary kernel memory locations, and consequently gain
privileges, via a VIDIOCSTUNER ioctl call on a /dev/video device, followed
by a VIDIOCSMICROCODE ioctl call on this device.
Ubuntu-Description
Kees Cook discovered that the V4L1 32bit compat interface did not correctly
validate certain parameters. A local attacker on a 64bit system with access
to a video device could exploit this to gain root privileges.
References
Assigned-to
sconklin
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Source: linux (LP Ubuntu Debian)
Upstream:needs-triage
Patches:
Hardy:http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-2963/patches/hardy/linux/0001-v4l-disable-dangerous-buggy-compat-function.txt
Jaunty:http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-2963/patches/jaunty/linux/0001-v4l-disable-dangerous-buggy-compat-function.txt
Karmic:http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-2963/patches/karmic/linux/0001-v4l-disable-dangerous-buggy-compat-function.txt
Lucid:http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-2963/patches/lucid/linux/0001-v4l-disable-dangerous-buggy-compat-function.txt
Maverick:http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-2963/patches/maverick/linux/0001-v4l-disable-dangerous-buggy-compat-function.txt
Package
Upstream:needs-triage
Package
Upstream:needs-triage
More Information

Valid XHTML 1.0 Strict

Updated: 2015-07-15 19:34:44 UTC (commit 9690)