Description
The usb_get_bos_descriptor function in drivers/usb/core/config.c in the
Linux kernel before 4.13.10 allows local users to cause a denial of service
(out-of-bounds read and system crash) or possibly have unspecified other
impact via a crafted USB device.
Ubuntu-Description
Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB BOS metadata. A physically proximate attacker
could use this to cause a denial of service (system crash).
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | not-affected
(4.13.0-25.29)
|
Ubuntu 16.04 ESM: | released
(4.4.0-101.124)
|
Ubuntu 14.04 ESM: | released
(3.13.0-157.207)
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1041.50)
|
Ubuntu 14.04 ESM: | released
(4.4.0-1003.3)
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
Ubuntu 16.04 ESM: | released
(4.13.0-1005.7)
|
Ubuntu 14.04 ESM: | not-affected
(4.15.0-1023.24~14.04.1)
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | not-affected
(4.18.0-1003.3~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
Ubuntu 16.04 ESM: | released
(4.13.0-1002.5)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | not-affected
|
Ubuntu 16.04 ESM: | released
(4.13.0-26.29~16.04.2)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | not-affected
(4.18.0-8.9~18.04.1)
|
Ubuntu 16.04 ESM: | released
(4.13.0-26.29~16.04.2)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1010.15)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [was needs-triage now end-of-life])
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | released
(4.4.0-101.124~14.04.1)
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.3)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | not-affected
(4.13.0-1008.8)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.14~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-04-13 12:57:00 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)