** Description changed:

  The OZWPAN driver in the Linux kernel through 4.0.5 relies on an
  untrusted length field during packet parsing, which allows remote
  attackers to obtain sensitive information from kernel memory or cause a
  denial of service (out-of-bounds read and system crash) via a crafted
  packet.
  
- Break-Fix: ae926051d7eb8f80dba9513db70d2e2fc8385d3a -
+ Break-Fix: ae926051d7eb8f80dba9513db70d2e2fc8385d3a
+ a73e99cb67e7438e5ab0c524ae63a8a27616c839

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1463740

Title:
  CVE-2015-4004

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1463740/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to