First published: Wed Mar 09 2016(Updated: )
A flaw was found in the Linux kernel handling when a buggy USB device is attached attempting to use the cdc_acm kernel module. This flaw would cause the kernel to panic by a null pointer dereference. Public via: <a href="http://seclists.org/bugtraq/2016/Mar/54">http://seclists.org/bugtraq/2016/Mar/54</a> CVE-ID request and assignment: <a href="http://seclists.org/oss-sec/2016/q1/605">http://seclists.org/oss-sec/2016/q1/605</a> <a href="http://seclists.org/oss-sec/2016/q1/622">http://seclists.org/oss-sec/2016/q1/622</a> Upstream patch: <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8835ba4a39cf53f705417b3b3a94eb067673f2c9">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8835ba4a39cf53f705417b3b3a94eb067673f2c9</a>
Credit: meissner@suse.de security@opentext.com meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=4.5.0 | |
Ubuntu Linux | =12.04 | |
SUSE Linux Enterprise Software Development Kit | =11.0-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12.0 | |
SUSE Linux Enterprise Software Development Kit | =12.0-sp1 | |
SUSE Linux Enterprise Debuginfo | =11.0-sp4 | |
SUSE Linux Enterprise Desktop | =12.0 | |
SUSE Linux Enterprise Desktop | =12.0-sp1 | |
SUSE Linux Enterprise Live Patching | =12.0 | |
SUSE Linux Enterprise Module for Public Cloud | =12.0 | |
SUSE Linux Enterprise Real Time Extension | =11.0-sp4 | |
SUSE Linux Enterprise Real Time Extension | =12.0-sp1 | |
SUSE Linux Enterprise Server | =11.0-extra | |
SUSE Linux Enterprise Server | =11.0-sp4 | |
SUSE Linux Enterprise Server | =12.0 | |
SUSE Linux Enterprise Server | =12.0-sp1 | |
SUSE Linux Enterprise Workstation Extension | =12.0 | |
SUSE Linux Enterprise Workstation Extension | =12.0-sp1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3138 has a high severity level due to the potential for kernel panic resulting from a null pointer dereference when interacting with specific USB devices.
To fix CVE-2016-3138, update the Linux kernel to versions 4.5.1 or later, or apply relevant patches provided by your distribution.
CVE-2016-3138 affects several distributions including certain versions of the Linux kernel, Ubuntu 12.04, and SUSE Linux Enterprise versions 11 and 12.
The impact of CVE-2016-3138 can cause system instability, leading to kernel panics when a problematic USB device is connected.
As a workaround for CVE-2016-3138, users should avoid connecting USB devices that may trigger the vulnerability until a fix is applied.