Description
drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-4032 | drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions. |
Ubuntu USN |
USN-2662-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2663-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2664-1 | Linux kernel (Utopic HWE) vulnerabilities |
Ubuntu USN |
USN-2665-1 | Linux kernel (Vivid HWE) vulnerabilities |
Ubuntu USN |
USN-2666-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2667-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T06:04:02.160Z
Reserved: 2015-05-15T00:00:00.000Z
Link: CVE-2015-4002
No data.
Status : Modified
Published: 2015-06-07T23:59:06.707
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-4002
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN