An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Broadcom
Subscribe
|
Fabric Operating System
Subscribe
|
|
Canonical
Subscribe
|
Ubuntu Linux
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Linux
Subscribe
|
Linux Kernel
Subscribe
|
|
Netapp
Subscribe
|
8300
Subscribe
8300 Firmware
Subscribe
8700
Subscribe
8700 Firmware
Subscribe
A400
Subscribe
A400 Firmware
Subscribe
A700s
Subscribe
A700s Firmware
Subscribe
Active Iq Unified Manager
Subscribe
Cloud Backup
Subscribe
Data Availability Services
Subscribe
E-series Santricity Os Controller
Subscribe
Element Software
Subscribe
H610s
Subscribe
H610s Firmware
Subscribe
Hci Management Node
Subscribe
Solidfire
Subscribe
Steelstore Cloud Integrated Storage
Subscribe
|
|
Opensuse
Subscribe
|
Leap
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2114-1 | linux-4.9 security update |
EUVD |
EUVD-2019-8397 | An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free. |
Ubuntu USN |
USN-4254-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4254-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-4258-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4284-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4287-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4287-2 | Linux kernel (Azure) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:02:38.287Z
Reserved: 2019-11-04T00:00:00.000Z
Link: CVE-2019-18683
No data.
Status : Modified
Published: 2019-11-04T16:15:11.327
Modified: 2024-11-21T04:33:31.440
Link: CVE-2019-18683
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN