The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
References
Configurations
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://openwall.com/lists/oss-security/2015/06/05/7 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/74669 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2989-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-2998-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3000-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3001-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3002-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3003-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3004-1 - Third Party Advisory | |
References | () https://lkml.org/lkml/2015/5/13/739 - Exploit, Vendor Advisory |
Information
Published : 2015-06-07 23:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-4004
Mitre link : CVE-2015-4004
CVE.ORG link : CVE-2015-4004
JSON object : View
Products Affected
canonical
- ubuntu_linux
linux
- linux_kernel
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer