Description
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel
before 3.12 does not validate the size of a memory block, which allows
local users to cause a denial of service (memory corruption) or possibly
gain privileges via crafted mmap operations, a different vulnerability than
CVE-2013-4511.
Ubuntu-Description
Nico Golde reported a flaw in the Linux kernel's userspace IO (uio) driver.
A local user could exploit this flaw to cause a denial of service (memory
corruption) or possibly gain privileges.
Notes
| seth-arnold | Marked 'low' because uio_mmap_physical()'s only caller does length
checking before the call, see the 12 November 2013 oss-security mail from
Petr Matousek. |
Package
| Upstream: | released
(3.12)
|
| Ubuntu 16.04 ESM (Xenial Xerus): | not-affected
(4.2.0-16.19)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | not-affected
(3.12.0-2.5)
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | not-affected
(4.10.0-19.21)
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
| Upstream: | released
(3.12)
|
| Ubuntu 16.04 ESM (Xenial Xerus): | not-affected
(4.4.0-1001.10)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | not-affected
(4.4.0-1002.2)
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored [was needed now end-of-life])
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored [was needed now end-of-life])
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored [abandoned])
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 16.04 ESM (Xenial Xerus): | not-affected
(4.8.0-36.36~16.04.1)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 16.04 ESM (Xenial Xerus): | not-affected
(4.8.0-36.36~16.04.1)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was not-affected [3.16.0-25.33~14.04.2])
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was not-affected [3.19.0-18.18~14.04.1])
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was not-affected [4.2.0-18.22~14.04.1])
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | not-affected
(4.4.0-13.29~14.04.1)
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored [abandoned])
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored [was needed now end-of-life])
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored [was needed now end-of-life])
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | not-affected
(4.10.0-1004.6)
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | not-affected
(4.4.0-1050.54)
|
Patches:
Package
| Upstream: | released
(3.12)
|
| Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
| Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Updated: 2022-02-11 00:38:12 UTC (commit acb3d89ab51f1d5e5543fa993969c0eb13c71f04)