CVE-2019-18683
📋 TL;DR
CVE-2019-18683 is a race condition vulnerability in the Linux kernel's VIVID video driver that can lead to use-after-free conditions. It allows local attackers with /dev/video0 access to potentially escalate privileges on affected systems. The vulnerability only exists when the VIVID driver is loaded, which is not the default on most distributions.
💻 Affected Systems
- Linux kernel
📦 What is this software?
E Series Santricity Os Controller by Netapp
Leap by Opensuse
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Solidfire by Netapp
Steelstore Cloud Integrated Storage by Netapp
View all CVEs affecting Steelstore Cloud Integrated Storage →
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to root, potentially leading to full system compromise and persistence.
Likely Case
Local privilege escalation for users with video device access, allowing elevation to root privileges.
If Mitigated
No impact if VIVID driver is not loaded or users lack /dev/video0 access.
🎯 Exploit Status
Exploitation requires local access, race condition timing, and specific driver configuration. Proof-of-concept code was published in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel 5.3.9 and later
Vendor Advisory: https://lore.kernel.org/lkml/20191103221719.27118-1-alex.popov@linux.com/
Restart Required: Yes
Instructions:
1. Update Linux kernel to version 5.3.9 or later. 2. Reboot the system to load the patched kernel. 3. Verify the kernel version with 'uname -r'.
🔧 Temporary Workarounds
Unload VIVID driver
linuxRemove the VIVID driver module if it's loaded
sudo rmmod vivid
Blacklist VIVID driver
linuxPrevent VIVID driver from loading at boot
echo 'blacklist vivid' | sudo tee /etc/modprobe.d/blacklist-vivid.conf
Restrict /dev/video0 access
linuxChange permissions on video devices to restrict access
sudo chmod 600 /dev/video0
sudo chown root:root /dev/video0
🧯 If You Can't Patch
- Unload the VIVID driver module if present
- Restrict access to /dev/video0 to trusted users only
🔍 How to Verify
Check if Vulnerable:
Check if VIVID driver is loaded: 'lsmod | grep vivid' and check kernel version: 'uname -r'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is 5.3.9 or later: 'uname -r' and ensure VIVID driver is not loaded: 'lsmod | grep vivid'
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- System crashes related to video drivers
- Unexpected privilege escalation events
Network Indicators:
- None - local exploitation only
SIEM Query:
Process elevation from non-privileged user to root without legitimate cause
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://www.openwall.com/lists/oss-security/2019/11/05/1
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- https://lore.kernel.org/lkml/20191103221719.27118-1-alex.popov%40linux.com/
- https://seclists.org/bugtraq/2020/Jan/10
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://usn.ubuntu.com/4254-1/
- https://usn.ubuntu.com/4254-2/
- https://usn.ubuntu.com/4258-1/
- https://usn.ubuntu.com/4284-1/
- https://usn.ubuntu.com/4287-1/
- https://usn.ubuntu.com/4287-2/
- https://www.openwall.com/lists/oss-security/2019/11/02/1
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://www.openwall.com/lists/oss-security/2019/11/05/1
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- https://lore.kernel.org/lkml/20191103221719.27118-1-alex.popov%40linux.com/
- https://seclists.org/bugtraq/2020/Jan/10
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://usn.ubuntu.com/4254-1/
- https://usn.ubuntu.com/4254-2/
- https://usn.ubuntu.com/4258-1/
- https://usn.ubuntu.com/4284-1/
- https://usn.ubuntu.com/4287-1/
- https://usn.ubuntu.com/4287-2/
- https://www.openwall.com/lists/oss-security/2019/11/02/1