Description
The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-4034 | The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet. |
Ubuntu USN |
USN-2989-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2998-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-3000-1 | Linux kernel (Utopic HWE) vulnerabilities |
Ubuntu USN |
USN-3001-1 | Linux kernel (Vivid HWE) vulnerabilities |
Ubuntu USN |
USN-3002-1 | Linux kernel (Wily HWE) vulnerabilities |
Ubuntu USN |
USN-3003-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3004-1 | Linux kernel (Raspberry Pi 2) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T06:04:02.838Z
Reserved: 2015-05-15T00:00:00.000Z
Link: CVE-2015-4004
No data.
Status : Deferred
Published: 2015-06-07T23:59:08.660
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-4004
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN