Description
Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd
function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel
before 3.17.4 allows local users to cause a denial of service (system
crash) or possibly gain privileges via a large message length in an ioctl
call.
Ubuntu-Description
A stack buffer overflow was discovered in the ioctl command handling for
the Technotrend/Hauppauge USB DEC devices driver. A local user could
exploit this flaw to cause a denial of service (system crash) or possibly
gain privileges.
Notes
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.04 preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support |
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | released
(3.2.0-73.108)
|
Ubuntu 14.04 ESM (Trusty Tahr): | released
(3.13.0-44.73)
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.2.0-16.19)
|
Patches:
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was released [3.2.0-1642.60])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | not-affected
(4.4.0-1002.2)
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.4.0-1001.10)
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | ignored
(abandoned)
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.4.0-1003.3)
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | ignored
(abandoned)
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.8.0-36.36~16.04.1)
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.8.0-36.36~16.04.1)
|
Product
linux-krillin: | ignored
(was needed now end-of-life)
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [was pending [3.5.0-58.85~precise1] OEM release])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [was needs-triage now end-of-life])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [was pending [3.11.0-31.52~precise1] OEM release])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | released
(3.13.0-44.73~precise1)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was released [3.16.0-29.39~14.04.1])
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was not-affected [3.19.0-18.18~14.04.1])
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was not-affected [4.2.0-18.22~14.04.1])
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | not-affected
(4.4.0-13.29~14.04.1)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | ignored
(abandoned)
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was ignored [abandoned])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.2.0-1013.19)
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | not-affected
(4.4.0-1012.12)
|
Package
Upstream: | released
(3.18~rc1)
|
Ubuntu 12.04 ESM (Precise Pangolin): | DNE
(precise was released [3.2.0-1457.77])
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Product
linux-vegetahd: | ignored
(was needed now end-of-life)
|
Updated: 2019-12-05 18:38:45 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)