CVE-2016-8658 (retired)

Priority
Description
Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel before 4.7.5 allows local users to cause a denial of service (system
crash) or possibly have unspecified other impact via a long SSID
Information Element in a command to a Netlink socket.
Ubuntu-Description
Daxing Guo discovered a stack-based buffer overflow in the Broadcom
IEEE802.11n FullMAC driver in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash) or possibly gain
privileges.
Notes
jdstrandandroid kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.4.0-51.72)
Patches:
Introduced by
1a87334239757b69eb9885979c32bbf871b3ec88
Fixed by
ded89912156b1a47d940a0c954c43afbabd0c42c
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1001.10)
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1003.3)
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Product
linux-krillin:not-affected
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.4.0-1038.45)
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.4.0-1042.46)
Package
Upstream:released (4.8~rc7)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Product
linux-vegetahd:not-affected
More Information

Updated: 2019-10-09 07:57:36 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)