MEDIUM · 4.6

CVE-2016-2186

The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system ...

Vulnerability Description

The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.

CVSS Score

4.6

MEDIUM

CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
LinuxLinux Kernel<= 4.5.0
NovellSuse Linux Enterprise Software Development Kit11.0
NovellSuse Linux Enterprise Debuginfo11.0
NovellSuse Linux Enterprise Desktop12.0
NovellSuse Linux Enterprise Live Patching12.0
NovellSuse Linux Enterprise Module For Public Cloud12.0
NovellSuse Linux Enterprise Real Time Extension11.0
NovellSuse Linux Enterprise Server11.0
NovellSuse Linux Enterprise Workstation Extension12.0
CanonicalUbuntu Linux12.04

References

FAQ

What is CVE-2016-2186?

CVE-2016-2186 is a vulnerability with a CVSS score of 4.6 (MEDIUM). The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system ...

How severe is CVE-2016-2186?

CVE-2016-2186 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-2186?

Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Novell Suse Linux Enterprise Software Development Kit, Novell Suse Linux Enterprise Debuginfo, Novell Suse Linux Enterprise Desktop, Novell Suse Linux Enterprise Live Patching.