The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-4034 | The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet. |
Ubuntu USN |
USN-2989-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2998-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-3000-1 | Linux kernel (Utopic HWE) vulnerabilities |
Ubuntu USN |
USN-3001-1 | Linux kernel (Vivid HWE) vulnerabilities |
Ubuntu USN |
USN-3002-1 | Linux kernel (Wily HWE) vulnerabilities |
Ubuntu USN |
USN-3003-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3004-1 | Linux kernel (Raspberry Pi 2) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T06:04:02.838Z
Reserved: 2015-05-15T00:00:00
Link: CVE-2015-4004
No data.
Status : Deferred
Published: 2015-06-07T23:59:08.660
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-4004
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN