** Description changed: The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet. - Break-Fix: ae926051d7eb8f80dba9513db70d2e2fc8385d3a - + Break-Fix: ae926051d7eb8f80dba9513db70d2e2fc8385d3a + a73e99cb67e7438e5ab0c524ae63a8a27616c839
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1463740 Title: CVE-2015-4004 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1463740/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs