CVE-2015-4004

Source
https://nvd.nist.gov/vuln/detail/CVE-2015-4004
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2015-4004.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2015-4004
Downstream
Published
2015-06-07T23:59:08Z
Modified
2025-08-09T19:01:28Z
Summary
[none]
Details

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

References

Affected packages