First published: Sun Jun 07 2015(Updated: )
drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.4.109 | |
Linux Kernel | >=3.5<3.10.81 | |
Linux Kernel | >=3.11<3.12.45 | |
Linux Kernel | >=3.13<3.14.45 | |
Linux Kernel | >=3.15<3.16.35 | |
Linux Kernel | >=3.17<3.18.18 | |
Linux Kernel | >=3.19<4.0.6 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
openSUSE | =13.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4002 is classified as a high severity vulnerability due to its potential to cause denial of service or arbitrary code execution.
To fix CVE-2015-4002, update the Linux kernel to a version that is patched, specifically versions 4.0.6 and later.
CVE-2015-4002 affects Linux kernel versions up to 4.0.5, including various earlier versions like 3.4.x to 3.19.x.
Yes, CVE-2015-4002 can be exploited remotely through crafted packets, leading to potential system crashes or arbitrary code execution.
CVE-2015-4002 impacts various distributions of Linux, including Ubuntu and OpenSUSE, specifically those running vulnerable kernel versions.