First published: Sat Sep 13 2014(Updated: )
Last updated 24 July 2024
Credit: cve-coordination@google.com chrome-cve-admin@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.2.63 | |
Linux Kernel | >=3.3<3.4.104 | |
Linux Kernel | >=3.5<3.10.54 | |
Linux Kernel | >=3.11<3.12.29 | |
Linux Kernel | >=3.13<3.14.18 | |
Linux Kernel | >=3.15<3.16.2 | |
Linux Kernel | <=3.16.1 | |
Linux Kernel | =3.16.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3185 is classified as a high severity memory corruption vulnerability affecting the Linux kernel when using the USB Serial Converter support.
To remediate CVE-2014-3185, update your Linux kernel to a version that is not vulnerable, such as versions 5.10.223-1, 5.10.226-1, or later.
CVE-2014-3185 affects various Linux kernel versions ranging from 3.2.0 to 3.16.1.
Yes, CVE-2014-3185 can lead to system crashes or potentially allow remote code execution if exploited by an attacker.
Yes, CVE-2014-3185 has been fixed in later kernel releases, ensuring that systems running these versions are protected from the vulnerability.