{"id":"CVE-2015-3331","details":"The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.","modified":"2026-02-04T18:18:37.270865Z","published":"2015-05-27T10:59:07Z","related":["MGASA-2015-0171","MGASA-2015-0172","MGASA-2015-0219","SUSE-RU-2015:0621-1","SUSE-SU-2015:0581-1","SUSE-SU-2015:0736-1","SUSE-SU-2015:1071-1","SUSE-SU-2015:1174-1","SUSE-SU-2015:1376-1","SUSE-SU-2015:1478-1","SUSE-SU-2015:1487-1","SUSE-SU-2015:1488-1","SUSE-SU-2015:1489-1","SUSE-SU-2015:1491-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1081.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1199.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3237"},{"type":"ADVISORY","url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.3"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032416"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2631-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2632-1"},{"type":"ADVISORY","url":"https://github.com/torvalds/linux/commit/ccfe8c3f7e52ae83155cb038753f4c75b774ca8a"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/04/14/16"},{"type":"REPORT","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html"},{"type":"REPORT","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html"},{"type":"REPORT","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html"},{"type":"REPORT","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html"},{"type":"REPORT","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213322"},{"type":"WEB","url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccfe8c3f7e52ae83155cb038753f4c75b774ca8a"}],"schema_version":"1.7.3"}