Description
sound/core/seq_device.c in the Linux kernel before 4.13.4 allows local
users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free
and system crash) or possibly have unspecified other impact via a crafted
USB device.
Ubuntu-Description
It was discovered that the Advanced Linux Sound Architecture (ALSA)
subsystem in the Linux kernel contained a use-after-free when handling
device removal. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.13.0-16.19)
|
Ubuntu 16.04 ESM: | released
(4.4.0-119.143)
|
Ubuntu 14.04 ESM: | not-affected
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1054.63)
|
Ubuntu 14.04 ESM: | released
(4.4.0-1016.16)
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
Ubuntu 16.04 ESM: | released
(4.13.0-1005.7)
|
Ubuntu 14.04 ESM: | not-affected
(4.15.0-1023.24~14.04.1)
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
Ubuntu 16.04 ESM: | released
(4.13.0-1002.5)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | not-affected
|
Ubuntu 16.04 ESM: | released
(4.13.0-26.29~16.04.2)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | released
(4.18.0-8.9~18.04.1)
|
Ubuntu 16.04 ESM: | released
(4.13.0-26.29~16.04.2)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1020.25)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [was needs-triage now end-of-life])
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | released
(4.4.0-119.143~14.04.1)
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.3)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.13.0-1005.5)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-04-13 12:56:58 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)