CVE-2015-4002

Linux Kernel < 3.4.109 - Memory Corruption

Title source: rule
STIX 2.1

Description

drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions.

References (9)

Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/74668
Third Party Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2665-1
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
Mailing List mailing-list x_refsource_mlist
http://openwall.com/lists/oss-security/2015/06/05/7
Third Party Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2667-1

Scores

EPSS 0.0372
EPSS Percentile 88.0%

Details

CWE
CWE-119
Status published
Products (4)
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 15.10
linux/linux_kernel < 3.4.109
opensuse/opensuse 13.2
Published Jun 07, 2015
Tracked Since Feb 18, 2026