First published: Tue Mar 22 2016(Updated: )
A vulnerability was found in the Linux kernel. A device pretending to be a device driven by the ims-pcu driver but leaving out either of the two interfaces present on the genuine device will oops the driver. Reference with proposed fix: <a href="https://bugzilla.novell.com/show_bug.cgi?id=971628">https://bugzilla.novell.com/show_bug.cgi?id=971628</a> Linux-input maintainer tree patch: <a href="https://kernel.googlesource.com/pub/scm/linux/kernel/git/dtor/input/+/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff">https://kernel.googlesource.com/pub/scm/linux/kernel/git/dtor/input/+/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff</a> An upstream patch: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff</a> CVE-ID request: <a href="http://seclists.org/oss-sec/2016/q1/715">http://seclists.org/oss-sec/2016/q1/715</a> CVE-ID assignment: <a href="http://seclists.org/oss-sec/2016/q1/717">http://seclists.org/oss-sec/2016/q1/717</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
SUSE Linux Enterprise Software Development Kit | =12.0 | |
SUSE Linux Enterprise Software Development Kit | =12.0-sp1 | |
SUSE Linux Enterprise Desktop | =12.0 | |
SUSE Linux Enterprise Desktop | =12.0-sp1 | |
SUSE Linux Enterprise Live Patching | =12.0 | |
SUSE Linux Enterprise Module for Public Cloud | =12.0 | |
SUSE Linux Enterprise Real Time Extension | =12.0-sp1 | |
SUSE Linux Enterprise Server | =12.0 | |
SUSE Linux Enterprise Server | =12.0-sp1 | |
SUSE Linux Enterprise Workstation Extension | =12.0 | |
SUSE Linux Enterprise Workstation Extension | =12.0-sp1 | |
Linux Kernel | <=4.5.0 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3689 is classified as a medium severity vulnerability that can cause a system crash when exploited.
To fix CVE-2016-3689, upgrade to the patched versions of the Linux kernel, specifically to versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1.
CVE-2016-3689 affects Linux kernels up to version 4.5.0.
CVE-2016-3689 primarily impacts SUSE Linux Enterprise products and Ubuntu Linux 14.04.
Failing to address CVE-2016-3689 may result in system crashes, potentially leading to downtime and loss of data.