Description
The get_endpoints function in drivers/usb/misc/usbtest.c in the Linux
kernel through 4.13.11 allows local users to cause a denial of service
(NULL pointer dereference and system crash) or possibly have unspecified
other impact via a crafted USB device.
Ubuntu-Description
Andrey Konovalov discovered that the usbtest device driver in the Linux
kernel did not properly validate endpoint metadata. A physically proximate
attacker could use this to cause a denial of service (system crash).
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-10.11)
|
Ubuntu 16.04 ESM: | released
(4.4.0-119.143)
|
Ubuntu 14.04 ESM: | released
(3.13.0-157.207)
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1054.63)
|
Ubuntu 14.04 ESM: | released
(4.4.0-1016.16)
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
Ubuntu 16.04 ESM: | released
(4.13.0-1014.17)
|
Ubuntu 14.04 ESM: | not-affected
(4.15.0-1023.24~14.04.1)
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | not-affected
(4.18.0-1003.3~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
Ubuntu 16.04 ESM: | released
(4.13.0-1012.16)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | not-affected
|
Ubuntu 16.04 ESM: | released
(4.13.0-38.43~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | not-affected
(4.18.0-8.9~18.04.1)
|
Ubuntu 16.04 ESM: | released
(4.13.0-38.43~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1020.25)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [was needs-triage now end-of-life])
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | released
(4.4.0-119.143~14.04.1)
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.3)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1006.7)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc5)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-04-13 12:56:59 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)