mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
88 lines
2.3 KiB
JSON
88 lines
2.3 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2015-4004",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"url" : "https://lkml.org/lkml/2015/5/13/739"
|
|
},
|
|
{
|
|
"url" : "http://openwall.com/lists/oss-security/2015/06/05/7"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-2989-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-2998-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3000-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3001-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3002-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3003-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3004-1"
|
|
},
|
|
{
|
|
"url" : "http://www.securityfocus.com/bid/74669"
|
|
}
|
|
]
|
|
}
|
|
}
|