A use-after-free vulnerability in fimg2d allows attackers to gain access to unauthorized data. The patch with error handling was applied. CVE assignment: http://seclists.org/oss-sec/2016/q4/405 External References: http://security.samsungmobile.com/smrupdate.html#SMR-NOV-2016
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1396671]
Not sure why we have a bug on this, the driver in question is in an upstream android tree at google, but not in Linus' linux kernel tree. Fedora doesn't ship this driver.
Righto, will close that up. There was enough CONFIG_EXYNO in the fedora kernels that it was affected.