CVE-2015-4004

NameCVE-2015-4004
DescriptionThe OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye5.10.223-1fixed
bullseye (security)5.10.226-1fixed
bookworm6.1.106-3fixed
bookworm (security)6.1.112-1fixed
trixie6.10.11-1fixed
sid6.11.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcewheezy(not affected)
linuxsource(unstable)4.3-1unimportant
linux-2.6source(unstable)(not affected)

Notes

ozwpan driver not built
[wheezy] - linux <not-affected> (ozwpan driver not present)
- linux-2.6 <not-affected> (ozwpan driver not present)
https://lkml.org/lkml/2015/5/13/739
Not enabled in Debian kernels; staging drivers are not supported
Driver was removed in Linux 4.3

Search for package or bug name: Reporting problems