Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-1909

Published: 14 May 2014

Integer signedness error in system/core/adb/adb_client.c in Android Debug Bridge (ADB) for Android 4.4 in the Android SDK Platform Tools 18.0.1 allows ADB servers to execute arbitrary code via a negative length value, which bypasses a signed comparison and triggers a stack-based buffer overflow.

Priority

Low

Status

Package Release Status
android-tools
Launchpad, Ubuntu, Debian
artful Ignored
(end of life)
bionic Not vulnerable
(4.2.2+git20130529-5.1)
cosmic Not vulnerable
(4.2.2+git20130529-5.1)
disco Not vulnerable
(4.2.2+git20130529-5.1)
lucid Does not exist

precise Does not exist

quantal Ignored
(end of life)
saucy Ignored
(end of life)
trusty Does not exist
(trusty was needed)
upstream Needs triage

utopic Ignored
(end of life)
vivid Ignored
(end of life)
wily Ignored
(end of life)
xenial Not vulnerable
(4.2.2+git20130529-5.1)
yakkety Ignored
(end of life)
zesty Ignored
(end of life)
Patches:
debian: http://anonscm.debian.org/cgit/android-tools/android-tools.git/tree/debian/patches/cve-2014-1909.patch
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.