First published: Mon May 09 2016(Updated: )
Heap-based buffer overflow in the private wireless extensions IOCTL implementation in wlan_hdd_wext.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that establishes a packet filter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=3.0.0<=3.19.8 | |
Linux kernel | >=4.0.0<=4.20.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0569 is categorized as a high severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2015-0569, update the Linux kernel to a version higher than 4.20.15 or 3.19.8 depending on your existing version.
CVE-2015-0569 affects Linux kernel versions 3.0.0 through 3.19.8 and 4.0.0 through 4.20.15, particularly in Qualcomm-based devices.
CVE-2015-0569 is a heap-based buffer overflow vulnerability in the wireless extensions IOCTL implementation.
No, CVE-2015-0569 requires local access for exploitation, making it a local privilege escalation vulnerability.