CVE-2015-7515

The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel before 4.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3607 Third Party Advisory
http://www.securityfocus.com/bid/84288 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2967-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2967-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2968-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2968-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2969-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2970-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-3 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1285326 Issue Tracking
https://github.com/torvalds/linux/commit/8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 Vendor Advisory
https://security-tracker.debian.org/tracker/CVE-2015-7515 Third Party Advisory
https://www.exploit-db.com/exploits/39544/ Third Party Advisory VDB Entry
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3607 Third Party Advisory
http://www.securityfocus.com/bid/84288 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2967-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2967-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2968-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2968-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2969-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2970-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-3 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1285326 Issue Tracking
https://github.com/torvalds/linux/commit/8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 Vendor Advisory
https://security-tracker.debian.org/tracker/CVE-2015-7515 Third Party Advisory
https://www.exploit-db.com/exploits/39544/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc8:*:*:*:*:*:*

History

21 Nov 2024, 02:36

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 - Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 - Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html - Third Party Advisory
References () http://www.debian.org/security/2016/dsa-3607 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3607 - Third Party Advisory
References () http://www.securityfocus.com/bid/84288 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/84288 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-2967-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2967-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-2967-2 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2967-2 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-2968-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2968-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-2968-2 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2968-2 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-2969-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2969-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-2970-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2970-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-2971-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2971-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-2971-2 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2971-2 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-2971-3 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2971-3 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1285326 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1285326 - Issue Tracking
References () https://github.com/torvalds/linux/commit/8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 - Vendor Advisory () https://github.com/torvalds/linux/commit/8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 - Vendor Advisory
References () https://security-tracker.debian.org/tracker/CVE-2015-7515 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2015-7515 - Third Party Advisory
References () https://www.exploit-db.com/exploits/39544/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/39544/ - Third Party Advisory, VDB Entry

Information

Published : 2016-04-27 17:59

Updated : 2024-11-21 02:36


NVD link : CVE-2015-7515

Mitre link : CVE-2015-7515

CVE.ORG link : CVE-2015-7515


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference