Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-4004

Опубликовано: 07 июн. 2015
Источник: debian

Описание

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.3-1package
linuxnot-affectedwheezypackage
linux-2.6not-affectedpackage

Примечания

  • ozwpan driver not built

  • https://lkml.org/lkml/2015/5/13/739

  • Not enabled in Debian kernels; staging drivers are not supported

  • Driver was removed in Linux 4.3

Связанные уязвимости

ubuntu
больше 10 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

CVSS3: 6.7
redhat
больше 10 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

nvd
больше 10 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

github
больше 3 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.