First published: Mon Nov 25 2019(Updated: )
The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.16.60 | |
Linux Linux kernel | >=3.17<3.18.113 | |
Linux Linux kernel | >=3.19<4.4.137 | |
Linux Linux kernel | >=4.5<4.9.108 | |
Linux Linux kernel | >=4.10<4.14.49 | |
Linux Linux kernel | >=4.15<4.16.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18675 is a vulnerability in the Linux kernel through 5.3.13 that allows local users with /dev/video0 access to obtain read and write permissions on kernel physical pages.
CVE-2019-18675 has a severity rating of 7.8 (high).
The affected software for CVE-2019-18675 is the Linux kernel versions up to 5.3.13.
To fix CVE-2019-18675, update to a version of the Linux kernel that is higher than 5.3.13.
More information about CVE-2019-18675 can be found in the references provided: https://deshal3v.github.io/blog/kernel-research/mmap_exploitation, https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=be83bbf806822b1b89e0a0f23cd87cddc409e429, https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/usb/cpia2/cpia2_core.c.