
Cloud Vulnerability DB
A community-led vulnerabilities database
In v4l2m2mquerybuf of v4l2-mem2mem.c, there is a possible out of bounds write vulnerability due to improper input validation in the Video for Linux 2 (V4L2) implementation in the Linux kernel. This vulnerability was assigned CVE-2022-20369 and was disclosed in August 2022. The vulnerability affects Android kernel and various Linux distributions including Ubuntu and Debian (NVD, Ubuntu).
The vulnerability is classified as an Out-of-bounds Write (CWE-787) with a CVSS v3.1 Base Score of 6.7 (Medium). The attack requires local access with high privileges, but no user interaction is needed for exploitation. The CVSS vector string is CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H (NVD).
If exploited, this vulnerability could lead to local escalation of privilege with System execution privileges. The potential impacts include denial of service (system crash) or possible execution of arbitrary code with elevated privileges (Ubuntu, Debian).
Multiple Linux distributions have released patches to address this vulnerability. Ubuntu has fixed this in various kernel versions including 5.4.0-128.144 for Ubuntu 20.04 LTS and 4.15.0-204.215 for Ubuntu 18.04 LTS. Debian has addressed this in version 4.19.269-1. Users are advised to update their systems with the latest security patches (Ubuntu, Debian).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."