CVE-2016-5400 (retired)

Priority
Description
Memory leak in the airspy_probe function in
drivers/media/usb/airspy/airspy.c in the airspy USB driver in the Linux
kernel before 4.7 allows local users to cause a denial of service (memory
consumption) via a crafted USB device that emulates many VFL_TYPE_SDR or
VFL_TYPE_SUBDEV devices and performs many connect and disconnect
operations.
Ubuntu-Description
James Patrick-Evans discovered that the airspy USB device driver in the
Linux kernel did not properly handle certain error conditions. An attacker
with physical access could use this to cause a denial of service (memory
consumption).
Notes
jdstrandandroid kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.4.0-36.55)
Patches:
Introduced by
f3e775962ccbc62bd93f2200b82db88af05d0137
Fixed by
aa93d1fee85c890a34f2510a310e55ee76a27848
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1001.10)
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1003.3)
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Product
linux-krillin:not-affected
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.4.0-1021.27)
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.4.0-1024.27)
Package
Upstream:released (4.7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Product
linux-vegetahd:not-affected
More Information

Updated: 2019-10-09 07:56:53 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)