Your submission was sent successfully! Close

CVE-2017-0561

Published: 07 April 2017

A remote code execution vulnerability in the Broadcom Wi-Fi firmware could enable a remote attacker to execute arbitrary code within the context of the Wi-Fi SoC. This issue is rated as Critical due to the possibility of remote code execution in the context of the Wi-Fi SoC. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34199105. References: B-RB#110814.

Priority

High

CVSS 3 base score: 9.8

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-flo
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-gke
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-mako
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-manta
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(code not present)

Notes

AuthorNote
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support
seth-arnold
android

References