{"id":"CVE-2016-3951","details":"Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.","modified":"2026-05-08T12:08:35.508348Z","published":"2016-05-02T10:59:41.490Z","related":["SUSE-SU-2016:1690-1","SUSE-SU-2016:1696-1","SUSE-SU-2016:1764-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"12.0-sp1"}],"cpe":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.0"}],"cpe":"cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"14.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"15.10"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"4.5.0-rc7"}],"cpe":"cpe:2.3:o:linux:linux_kernel:4.5.0:rc7:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12"}],"cpe":"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12-sp1"}],"cpe":"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.0"}],"cpe":"cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12"}],"cpe":"cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12-sp1"}],"cpe":"cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.0"}],"cpe":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.0-sp1"}],"cpe":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.0"}],"cpe":"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.0-sp1"}],"cpe":"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/04/06/4"},{"type":"WEB","url":"http://www.securityfocus.com/bid/91028"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036763"},{"type":"WEB","url":"https://www.spinics.net/lists/netdev/msg367669.html"},{"type":"ADVISORY","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1666984c8625b3db19a9abc298931d35ab7bc64b"},{"type":"ADVISORY","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4d06dd537f95683aba3651098ae288b7cbff8274"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3607"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2989-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2998-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3000-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3001-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3002-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3003-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3004-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3021-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3021-2"},{"type":"ADVISORY","url":"https://github.com/torvalds/linux/commit/1666984c8625b3db19a9abc298931d35ab7bc64b"},{"type":"ADVISORY","url":"https://github.com/torvalds/linux/commit/4d06dd537f95683aba3651098ae288b7cbff8274"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1324782"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git","events":[{"introduced":"0"},{"fixed":"b562e44f507e863c6792946e4e1b1449fbbac85d"},{"fixed":"1666984c8625b3db19a9abc298931d35ab7bc64b"},{"fixed":"4d06dd537f95683aba3651098ae288b7cbff8274"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"4.5"}],"source":["DESCRIPTION","REFERENCES"]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-3951.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/torvalds/linux","events":[{"introduced":"0"},{"fixed":"1666984c8625b3db19a9abc298931d35ab7bc64b"},{"fixed":"4d06dd537f95683aba3651098ae288b7cbff8274"}],"database_specific":{"source":"REFERENCES"}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-3951.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}