CVE-2015-7515

The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel before 4.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3607 Third Party Advisory
http://www.securityfocus.com/bid/84288 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2967-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2967-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2968-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2968-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2969-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2970-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-3 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1285326 Issue Tracking
https://github.com/torvalds/linux/commit/8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 Vendor Advisory
https://security-tracker.debian.org/tracker/CVE-2015-7515 Third Party Advisory
https://www.exploit-db.com/exploits/39544/ Third Party Advisory VDB Entry
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3607 Third Party Advisory
http://www.securityfocus.com/bid/84288 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2967-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2967-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2968-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2968-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2969-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2970-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2971-3 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1285326 Issue Tracking
https://github.com/torvalds/linux/commit/8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 Vendor Advisory
https://security-tracker.debian.org/tracker/CVE-2015-7515 Third Party Advisory
https://www.exploit-db.com/exploits/39544/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4:rc8:*:*:*:*:*:*

History

No history.

Information

Published : 2016-04-27 17:59

Updated : 2025-04-12 10:46


NVD link : CVE-2015-7515

Mitre link : CVE-2015-7515

CVE.ORG link : CVE-2015-7515


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference