First published: Tue Apr 19 2016(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
Linux Linux kernel | <3.2.80 | |
Linux Linux kernel | >=3.3<3.10.102 | |
Linux Linux kernel | >=3.11<3.12.59 | |
Linux Linux kernel | >=3.13<3.14.68 | |
Linux Linux kernel | >=3.17<3.18.37 | |
Linux Linux kernel | >=3.19<4.1.28 | |
Linux Linux kernel | >=4.2<4.4.9 | |
Linux Linux kernel | >=4.5<4.5.3 | |
Debian Debian Linux | =8.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3955 is a vulnerability in the Linux kernel that allows remote attackers to cause a denial of service or possibly have unspecified other impact.
CVE-2016-3955 has a severity rating of high with a value of 7.
CVE-2016-3955 affects Linux systems running kernel versions before 4.5.3.
To fix CVE-2016-3955, you should update your Linux kernel to version 4.5.3 or higher.
You can find more information about CVE-2016-3955 on the following links: [http://www.openwall.com/lists/oss-security/2016/04/19/1](http://www.openwall.com/lists/oss-security/2016/04/19/1), [http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb), [http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3)