CVE-2015-4002
Summary
| CVE | CVE-2015-4002 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-06-07 23:59:00 UTC |
| Updated | 2022-11-03 02:03:00 UTC |
| Description | drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| kernel/git/torvalds/linux.git - Linux kernel source tree |
CONFIRM |
git.kernel.org |
|
| kernel/git/torvalds/linux.git - Linux kernel source tree |
CONFIRM |
git.kernel.org |
|
| Linux Kernel 'ozwpan' Driver Multiple Denial of Service Vulnerabilities |
BID |
www.securityfocus.com |
|
| ozwpan: unchecked signed subtraction leads to DoS · torvalds/linux@9a59029 · GitHub |
CONFIRM |
github.com |
Vendor Advisory |
| ozwpan: Use proper check to prevent heap overflow · torvalds/linux@d114b9f · GitHub |
CONFIRM |
github.com |
Vendor Advisory |
| USN-2665-1: Linux kernel (Vivid HWE) vulnerabilities | Ubuntu |
UBUNTU |
www.ubuntu.com |
|
| oss-security - Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities |
MLIST |
openwall.com |
|
| [security-announce] openSUSE-SU-2015:1382-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| USN-2667-1: Linux kernel vulnerabilities | Ubuntu |
UBUNTU |
www.ubuntu.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 671047 EulerOS Security Update for kernel (EulerOS-SA-2021-2588)