CVE-2015-4004

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2015-4004
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2015-4004.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2015-4004
Related
Published
2015-06-07T23:59:08Z
Modified
2024-06-30T12:01:22Z
Summary
[none]
Details

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3-1

Ecosystem specific

{
    "urgency": "unimportant"
}