Description
drivers/media/v4l2-core/videobuf2-v4l2.c in the Linux kernel before 4.5.3
allows local users to cause a denial of service (kernel memory write
operation) or possibly have unspecified other impact via a crafted number
of planes in a VIDIOC_DQBUF ioctl call.
Ubuntu-Description
It was discovered that the Video For Linux Two (v4l2) implementation in the
Linux kernel did not properly handle multiple planes when processing a
VIDIOC_DQBUF ioctl(). A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.
Notes
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support |
sbeattie | 2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab was reverted in
93f0750dcdaed083d6209b01e952e98ca730db66 |
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 16.04 ESM: | released
(4.4.0-57.78)
|
Ubuntu 14.04 ESM: | not-affected
|
Ubuntu 20.04 FIPS Compliant: | not-affected
(4.8.0-22.24)
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 16.04 ESM: | not-affected
(4.4.0-1001.10)
|
Ubuntu 14.04 ESM: | not-affected
(4.4.0-1002.2)
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | not-affected
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | not-affected
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 16.04 ESM: | not-affected
(4.8.0-36.36~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 16.04 ESM: | not-affected
(4.8.0-36.36~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
(trusty was not-affected)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
(trusty was not-affected)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
(trusty was not-affected)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | released
(4.4.0-57.78~14.04.1)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | not-affected
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | not-affected
(4.8.0-1013.15)
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | not-affected
(4.4.0-1046.50)
|
Patches:
Package
Upstream: | released
(4.8~rc1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Updated: 2022-04-13 12:21:20 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)