CVE-2015-4004

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
References
Link Resource
http://openwall.com/lists/oss-security/2015/06/05/7 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/74669 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2989-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2998-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3000-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3001-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3002-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3003-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3004-1 Third Party Advisory
https://lkml.org/lkml/2015/5/13/739 Exploit Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

12 Dec 2022, 20:21

Type Values Removed Values Added
References (UBUNTU) http://www.ubuntu.com/usn/USN-3000-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-3000-1 - Third Party Advisory
References (MLIST) http://openwall.com/lists/oss-security/2015/06/05/7 - (MLIST) http://openwall.com/lists/oss-security/2015/06/05/7 - Mailing List, Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-3003-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-3003-1 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-2989-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-2989-1 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-3004-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-3004-1 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/74669 - (BID) http://www.securityfocus.com/bid/74669 - Third Party Advisory, VDB Entry
References (UBUNTU) http://www.ubuntu.com/usn/USN-3001-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-3001-1 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-3002-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-3002-1 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-2998-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-2998-1 - Third Party Advisory
CPE cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*

Information

Published : 2015-06-07 23:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-4004

Mitre link : CVE-2015-4004

CVE.ORG link : CVE-2015-4004


JSON object : View

Products Affected

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer