kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #24174
[Bug 1244800] [NEW] CVE-2013-4738
*** This bug is a security vulnerability ***
Public security bug reported:
The camera post processing engine (CPP) and video processing engine
(VPE) provide an ioctl system call interface to user space clients for
communication. When processing arguments passed to the
VIDIOC_MSM_CPP_DEQUEUE_STREAM_BUFF_INFO or
VIDIOC_MSM_VPE_DEQUEUE_STREAM_BUFF_INFO ioctl subdev handlers, a user
space supplied length value is used to copy memory to a local stack
buffer without proper bounds checking. An application with access to the
respective device nodes can use this flaw to, e.g., elevate privileges.
Break-Fix: - c9c81836ee44db9974007d34cf2aaeb1a51a8d45
Break-Fix: - 28385b9c3054c91dca1aa194ffa750550c50f3ce
** Affects: linux (Ubuntu)
Importance: High
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-ec2 (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-lts-raring (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu)
Importance: High
Status: New
** Affects: linux (Ubuntu Lucid)
Importance: High
Status: New
** Affects: linux-armadaxp (Ubuntu Lucid)
Importance: High
Status: Invalid
** Affects: linux-ec2 (Ubuntu Lucid)
Importance: High
Status: New
** Affects: linux-fsl-imx51 (Ubuntu Lucid)
Importance: High
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Lucid)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu Lucid)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Lucid)
Importance: High
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Lucid)
Importance: High
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Lucid)
Importance: High
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Lucid)
Importance: High
Status: Invalid
** Affects: linux (Ubuntu Precise)
Importance: High
Status: New
** Affects: linux-armadaxp (Ubuntu Precise)
Importance: High
Status: New
** Affects: linux-ec2 (Ubuntu Precise)
Importance: High
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Precise)
Importance: High
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Precise)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu Precise)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Precise)
Importance: High
Status: New
** Affects: linux-lts-raring (Ubuntu Precise)
Importance: High
Status: New
** Affects: linux-mvl-dove (Ubuntu Precise)
Importance: High
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Precise)
Importance: High
Status: New
** Affects: linux (Ubuntu Quantal)
Importance: High
Status: New
** Affects: linux-armadaxp (Ubuntu Quantal)
Importance: High
Status: New
** Affects: linux-ec2 (Ubuntu Quantal)
Importance: High
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Quantal)
Importance: High
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Quantal)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu Quantal)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Quantal)
Importance: High
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Quantal)
Importance: High
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Quantal)
Importance: High
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Quantal)
Importance: High
Status: New
** Affects: linux (Ubuntu Raring)
Importance: High
Status: New
** Affects: linux-armadaxp (Ubuntu Raring)
Importance: High
Status: Invalid
** Affects: linux-ec2 (Ubuntu Raring)
Importance: High
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Raring)
Importance: High
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Raring)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu Raring)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Raring)
Importance: High
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Raring)
Importance: High
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Raring)
Importance: High
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Raring)
Importance: High
Status: New
** Affects: linux (Ubuntu Saucy)
Importance: High
Status: New
** Affects: linux-armadaxp (Ubuntu Saucy)
Importance: High
Status: Invalid
** Affects: linux-ec2 (Ubuntu Saucy)
Importance: High
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: High
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Saucy)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu Saucy)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Saucy)
Importance: High
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Saucy)
Importance: High
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Saucy)
Importance: High
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Saucy)
Importance: High
Status: New
** Affects: linux (Ubuntu Trusty)
Importance: High
Status: New
** Affects: linux-armadaxp (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-ec2 (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-lts-backport-maverick (Ubuntu Trusty)
Importance: Undecided
Status: New
** Affects: linux-lts-backport-natty (Ubuntu Trusty)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-mvl-dove (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Trusty)
Importance: High
Status: New
** Tags: kernel-cve-tracking-bug
** Tags added: kernel-cve-tracking-bug
** Information type changed from Public to Public Security
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-4738
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1244800
Title:
CVE-2013-4738
Status in “linux” package in Ubuntu:
New
Status in “linux-armadaxp” package in Ubuntu:
Invalid
Status in “linux-ec2” package in Ubuntu:
Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
New
Status in “linux-lts-backport-natty” package in Ubuntu:
New
Status in “linux-lts-quantal” package in Ubuntu:
Invalid
Status in “linux-lts-raring” package in Ubuntu:
Invalid
Status in “linux-mvl-dove” package in Ubuntu:
Invalid
Status in “linux-ti-omap4” package in Ubuntu:
New
Status in “linux” source package in Lucid:
New
Status in “linux-armadaxp” source package in Lucid:
Invalid
Status in “linux-ec2” source package in Lucid:
New
Status in “linux-fsl-imx51” source package in Lucid:
Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
New
Status in “linux-lts-backport-natty” source package in Lucid:
New
Status in “linux-lts-quantal” source package in Lucid:
Invalid
Status in “linux-lts-raring” source package in Lucid:
Invalid
Status in “linux-mvl-dove” source package in Lucid:
Invalid
Status in “linux-ti-omap4” source package in Lucid:
Invalid
Status in “linux” source package in Precise:
New
Status in “linux-armadaxp” source package in Precise:
New
Status in “linux-ec2” source package in Precise:
Invalid
Status in “linux-fsl-imx51” source package in Precise:
Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
New
Status in “linux-lts-backport-natty” source package in Precise:
New
Status in “linux-lts-quantal” source package in Precise:
New
Status in “linux-lts-raring” source package in Precise:
New
Status in “linux-mvl-dove” source package in Precise:
Invalid
Status in “linux-ti-omap4” source package in Precise:
New
Status in “linux” source package in Quantal:
New
Status in “linux-armadaxp” source package in Quantal:
New
Status in “linux-ec2” source package in Quantal:
Invalid
Status in “linux-fsl-imx51” source package in Quantal:
Invalid
Status in “linux-lts-backport-maverick” source package in Quantal:
New
Status in “linux-lts-backport-natty” source package in Quantal:
New
Status in “linux-lts-quantal” source package in Quantal:
Invalid
Status in “linux-lts-raring” source package in Quantal:
Invalid
Status in “linux-mvl-dove” source package in Quantal:
Invalid
Status in “linux-ti-omap4” source package in Quantal:
New
Status in “linux” source package in Raring:
New
Status in “linux-armadaxp” source package in Raring:
Invalid
Status in “linux-ec2” source package in Raring:
Invalid
Status in “linux-fsl-imx51” source package in Raring:
Invalid
Status in “linux-lts-backport-maverick” source package in Raring:
New
Status in “linux-lts-backport-natty” source package in Raring:
New
Status in “linux-lts-quantal” source package in Raring:
Invalid
Status in “linux-lts-raring” source package in Raring:
Invalid
Status in “linux-mvl-dove” source package in Raring:
Invalid
Status in “linux-ti-omap4” source package in Raring:
New
Status in “linux” source package in Saucy:
New
Status in “linux-armadaxp” source package in Saucy:
Invalid
Status in “linux-ec2” source package in Saucy:
Invalid
Status in “linux-fsl-imx51” source package in Saucy:
Invalid
Status in “linux-lts-backport-maverick” source package in Saucy:
New
Status in “linux-lts-backport-natty” source package in Saucy:
New
Status in “linux-lts-quantal” source package in Saucy:
Invalid
Status in “linux-lts-raring” source package in Saucy:
Invalid
Status in “linux-mvl-dove” source package in Saucy:
Invalid
Status in “linux-ti-omap4” source package in Saucy:
New
Status in “linux” source package in Trusty:
New
Status in “linux-armadaxp” source package in Trusty:
Invalid
Status in “linux-ec2” source package in Trusty:
Invalid
Status in “linux-fsl-imx51” source package in Trusty:
Invalid
Status in “linux-lts-backport-maverick” source package in Trusty:
New
Status in “linux-lts-backport-natty” source package in Trusty:
New
Status in “linux-lts-quantal” source package in Trusty:
Invalid
Status in “linux-lts-raring” source package in Trusty:
Invalid
Status in “linux-mvl-dove” source package in Trusty:
Invalid
Status in “linux-ti-omap4” source package in Trusty:
New
Bug description:
The camera post processing engine (CPP) and video processing engine
(VPE) provide an ioctl system call interface to user space clients for
communication. When processing arguments passed to the
VIDIOC_MSM_CPP_DEQUEUE_STREAM_BUFF_INFO or
VIDIOC_MSM_VPE_DEQUEUE_STREAM_BUFF_INFO ioctl subdev handlers, a user
space supplied length value is used to copy memory to a local stack
buffer without proper bounds checking. An application with access to
the respective device nodes can use this flaw to, e.g., elevate
privileges.
Break-Fix: - c9c81836ee44db9974007d34cf2aaeb1a51a8d45
Break-Fix: - 28385b9c3054c91dca1aa194ffa750550c50f3ce
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1244800/+subscriptions
Follow ups
-
[Bug 1244800] Re: CVE-2013-4738
From: Mathew Hodson, 2015-05-11
-
[Bug 1244800] Re: CVE-2013-4738
From: Mathew Hodson, 2015-04-06
-
[Bug 1244800] Re: CVE-2013-4738
From: Mathew Hodson, 2015-03-25
-
[Bug 1244800] Re: CVE-2013-4738
From: Rolf Leggewie, 2014-12-05
-
[Bug 1244800] Closing unsupported series nomination.
From: Joseph Salisbury, 2014-09-15
-
[Bug 1244800] Re: CVE-2013-4738
From: Jamie Strandboge, 2014-06-26
-
[Bug 1244800] Re: CVE-2013-4738
From: CSRedRat, 2014-04-22
-
[Bug 1244800] Re: CVE-2013-4738
From: Jamie Strandboge, 2014-04-17
-
[Bug 1244800] Re: CVE-2013-4738
From: Jamie Strandboge, 2013-11-12
-
[Bug 1244800] Re: CVE-2013-4738
From: Jamie Strandboge, 2013-11-12
-
[Bug 1244800] Re: CVE-2013-4738
From: Jamie Strandboge, 2013-11-12
-
[Bug 1244800]
From: Jamie Strandboge, 2013-11-12
-
[Bug 1244800]
From: Jamie Strandboge, 2013-11-12
-
[Bug 1244800]
From: Jamie Strandboge, 2013-11-12
-
[Bug 1244800] Re: CVE-2013-4738
From: John Johansen, 2013-10-25
-
[Bug 1244800] [NEW] CVE-2013-4738
From: John Johansen, 2013-10-25
References