Bug 2162084 (CVE-2015-4002) - CVE-2015-4002 kernel: ozwpan: improper bounds checking leads to DoS or heap overflow
Summary: CVE-2015-4002 kernel: ozwpan: improper bounds checking leads to DoS or heap o...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2015-4002
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2152813
TreeView+ depends on / blocked
 
Reported: 2023-01-18 18:05 UTC by Mauro Matteo Cascella
Modified: 2023-03-15 10:48 UTC (History)
37 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-01-18 18:11:46 UTC
Embargoed:


Attachments (Terms of Use)

Description Mauro Matteo Cascella 2023-01-18 18:05:57 UTC
drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions.

References:
https://www.openwall.com/lists/oss-security/2015/06/05/7
https://lkml.org/lkml/2015/5/13/742
https://lkml.org/lkml/2015/5/13/740

Upstream commits:
https://github.com/torvalds/linux/commit/9a59029bc218b48eff8b5d4dde5662fd79d3e1a8
https://github.com/torvalds/linux/commit/d114b9fe78c8d6fc6e70808c2092aa307c36dc8e


Note You need to log in before you can comment on or make changes to this bug.