CVE-2015-4004

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
References
Link Resource
http://openwall.com/lists/oss-security/2015/06/05/7 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/74669 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2989-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2998-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3000-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3001-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3002-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3003-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3004-1 Third Party Advisory
https://lkml.org/lkml/2015/5/13/739 Exploit Vendor Advisory
http://openwall.com/lists/oss-security/2015/06/05/7 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/74669 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2989-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2998-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3000-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3001-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3002-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3003-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3004-1 Third Party Advisory
https://lkml.org/lkml/2015/5/13/739 Exploit Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:30

Type Values Removed Values Added
References () http://openwall.com/lists/oss-security/2015/06/05/7 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2015/06/05/7 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/74669 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/74669 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-2989-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2989-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-2998-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2998-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3000-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3000-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3001-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3001-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3002-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3002-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3003-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3003-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3004-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3004-1 - Third Party Advisory
References () https://lkml.org/lkml/2015/5/13/739 - Exploit, Vendor Advisory () https://lkml.org/lkml/2015/5/13/739 - Exploit, Vendor Advisory

Information

Published : 2015-06-07 23:59

Updated : 2024-11-21 02:30


NVD link : CVE-2015-4004

Mitre link : CVE-2015-4004

CVE.ORG link : CVE-2015-4004


JSON object : View

Products Affected

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer