CVE-2016-3137
Published on: 05/02/2016 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:03 PM UTC
Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:
drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.
- CVE-2016-3137 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 4.6 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
PHYSICAL | LOW | NONE | NONE | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 4.9 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
[security-announce] openSUSE-SU-2016:1382-1: important: Security update | lists.opensuse.org text/html |
![]() |
kernel/git/torvalds/linux.git - Linux kernel source tree | Vendor Advisory git.kernel.org text/html |
![]() |
oss-security - Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cypress_m8 driver) | www.openwall.com text/html |
![]() |
1316996 – (CVE-2016-3137) CVE-2016-3137 kernel: Crash on invalid USB device descriptors (cypress_m8 driver) | Issue Tracking bugzilla.redhat.com text/html |
![]() |
[security-announce] SUSE-SU-2016:1707-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
USN-2971-2: Linux kernel (Wily HWE) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
USN-3000-1: Linux kernel (Utopic HWE) vulnerabilities | Ubuntu | Third Party Advisory www.ubuntu.com text/html |
![]() |
USN-2968-1: Linux kernel vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
[security-announce] SUSE-SU-2016:2074-1: important: Security update for | lists.opensuse.org text/html |
![]() |
[security-announce] SUSE-SU-2016:1672-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
USN-2970-1: Linux kernel (Vivid HWE) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
USN-2968-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
Debian -- Security Information -- DSA-3607-1 linux | www.debian.org Depreciated Link text/html |
![]() |
USN-2996-1: Linux kernel vulnerabilities | Ubuntu | Third Party Advisory www.ubuntu.com text/html |
![]() |
USN-2971-1: Linux kernel vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
[security-announce] SUSE-SU-2016:1764-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
Linux Kernel 'usb/serial/cypress_m8.c' Null Pointer Deference Local Denial of Service Vulnerability | cve.report (archive) text/html |
![]() |
[security-announce] SUSE-SU-2016:1690-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
[security-announce] SUSE-SU-2016:1696-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
Vendor Advisory www.kernel.org text/plain |
![]() | |
USN-2997-1: Linux kernel (OMAP4) vulnerabilities | Ubuntu | Third Party Advisory www.ubuntu.com text/html |
![]() |
USB: cypress_m8: add endpoint sanity check · torvalds/[email protected] · GitHub | github.com text/html |
![]() |
USN-2971-3: Linux kernel (Raspberry Pi 2) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE