The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
References
Link | Resource |
---|---|
http://openwall.com/lists/oss-security/2015/06/05/7 | Mailing List Third Party Advisory |
https://lkml.org/lkml/2015/5/13/739 | Exploit Vendor Advisory |
http://www.ubuntu.com/usn/USN-3000-1 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-2998-1 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-3002-1 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-3003-1 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-3001-1 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-3004-1 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-2989-1 | Third Party Advisory |
http://www.securityfocus.com/bid/74669 | Third Party Advisory VDB Entry |
Information
Published : 2015-06-07 16:59
Updated : 2022-12-12 12:21
NVD link : CVE-2015-4004
Mitre link : CVE-2015-4004
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
canonical
- ubuntu_linux
linux
- linux_kernel