Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-05785

Опубликовано: 03 окт. 2019
Источник: fstec
CVSS3: 5.5
CVSS2: 2.1
EPSS Низкий

Описание

Уязвимость функции create_pinctrl (core.c) контроллера контактов ввода-вывода операционной системы Android связана с использованием памяти после её освобождения. Эксплуатация уязвимости может позволить нарушителю раскрыть защищаемую информацию

Вендор

Google Inc.
Novell Inc.
Сообщество свободного программного обеспечения

Наименование ПО

Android
SUSE Linux Enterprise Server for SAP Applications
SUSE OpenStack Cloud
SUSE Linux Enterprise Module for Basesystem
SUSE Enterprise Storage
SUSE Linux Enterprise Module for Development Tools
Suse Linux Enterprise Server
SUSE Linux Enterprise High Availability
SUSE Linux Enterprise Live Patching
SUSE Linux Enterprise Module for Legacy Software
SUSE Linux Enterprise Module for Live Patching
SUSE Linux Enterprise Workstation Extension
SUSE Linux Enterprise Module for Open Buildservice Development Tools
OpenSUSE Leap
SUSE Linux Enterprise Software Development Kit
SUSE OpenStack Cloud Crowbar
SUSE Linux Enterprise Module for Public Cloud
SUSE Linux Enterprise Module for Realtime packages
SUSE Linux Enterprise High Performance Computing
Linux

Версия ПО

- (Android)
12 SP2 (SUSE Linux Enterprise Server for SAP Applications)
12 SP2-BCL (SUSE Linux Enterprise Server for SAP Applications)
12 SP2-ESPOS (SUSE Linux Enterprise Server for SAP Applications)
12 SP2-LTSS (SUSE Linux Enterprise Server for SAP Applications)
12 SP3 (SUSE Linux Enterprise Server for SAP Applications)
12 SP4 (SUSE Linux Enterprise Server for SAP Applications)
7 (SUSE OpenStack Cloud)
15 SP1 (SUSE Linux Enterprise Module for Basesystem)
5 (SUSE Enterprise Storage)
15 SP1 (SUSE Linux Enterprise Module for Development Tools)
12 SP2-BCL (Suse Linux Enterprise Server)
12 SP2-ESPOS (Suse Linux Enterprise Server)
12 SP2 (SUSE Linux Enterprise High Availability)
12 SP3 (SUSE Linux Enterprise High Availability)
12 SP4 (SUSE Linux Enterprise High Availability)
15 (SUSE Linux Enterprise High Availability)
15 SP1 (SUSE Linux Enterprise High Availability)
12 SP4 (SUSE Linux Enterprise Live Patching)
15 SP1 (SUSE Linux Enterprise Module for Legacy Software)
15 (SUSE Linux Enterprise Module for Live Patching)
15 SP1 (SUSE Linux Enterprise Workstation Extension)
15 SP1 (SUSE Linux Enterprise Module for Open Buildservice Development Tools)
15.1 (OpenSUSE Leap)
15 (SUSE Linux Enterprise Server for SAP Applications)
12 SP2-LTSS (Suse Linux Enterprise Server)
15 SP1 (SUSE Linux Enterprise Module for Live Patching)
12 SP3-LTSS (Suse Linux Enterprise Server)
8 (SUSE OpenStack Cloud)
12 SP3-BCL (Suse Linux Enterprise Server)
12 SP5 (Suse Linux Enterprise Server)
12 SP3-BCL (SUSE Linux Enterprise Server for SAP Applications)
12 SP3-LTSS (SUSE Linux Enterprise Server for SAP Applications)
12 SP5 (SUSE Linux Enterprise Server for SAP Applications)
12 SP5 (SUSE Linux Enterprise Software Development Kit)
8 (SUSE OpenStack Cloud Crowbar)
15 SP1 (SUSE Linux Enterprise Module for Public Cloud)
12 SP3-ESPOS (Suse Linux Enterprise Server)
12 SP3-ESPOS (SUSE Linux Enterprise Server for SAP Applications)
9 (SUSE OpenStack Cloud)
9 (SUSE OpenStack Cloud Crowbar)
12 SP5 (SUSE Linux Enterprise High Availability)
15 SP1 (SUSE Linux Enterprise Module for Realtime packages)
12 SP5 (SUSE Linux Enterprise Workstation Extension)
12 SP5 (SUSE Linux Enterprise Live Patching)
15-ESPOS (SUSE Linux Enterprise High Performance Computing)
15-LTSS (SUSE Linux Enterprise High Performance Computing)
15-LTSS (Suse Linux Enterprise Server)
15 SP2 (SUSE Linux Enterprise Module for Basesystem)
15 SP2 (SUSE Linux Enterprise Module for Open Buildservice Development Tools)
15 SP2 (SUSE Linux Enterprise Workstation Extension)
15.2 (OpenSUSE Leap)
15 SP2 (SUSE Linux Enterprise Module for Development Tools)
12 SP4 LTSS (Suse Linux Enterprise Server)
12 SP4-LTSS (SUSE Linux Enterprise Server for SAP Applications)
12 SP4-ESPOS (SUSE Linux Enterprise Server for SAP Applications)
15 SP2 (SUSE Linux Enterprise High Availability)
15 SP2 (SUSE Linux Enterprise Module for Legacy Software)
15 SP2 (SUSE Linux Enterprise Module for Live Patching)
15 SP2 (SUSE Linux Enterprise Module for Public Cloud)
от 4.10 до 4.14.160 включительно (Linux)
от 4.15 до 4.19.91 включительно (Linux)
от 4.20 до 5.4.6 включительно (Linux)
от 4.0 до 4.4.243 включительно (Linux)
от 4.5 до 4.9.243 включительно (Linux)

Тип ПО

Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Google Inc. Android -
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2-BCL
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2-ESPOS
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2-LTSS
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP4
Novell Inc. Suse Linux Enterprise Server 12 SP2-BCL
Novell Inc. Suse Linux Enterprise Server 12 SP2-ESPOS
Novell Inc. OpenSUSE Leap 15.1
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15
Novell Inc. Suse Linux Enterprise Server 12 SP2-LTSS
Novell Inc. Suse Linux Enterprise Server 12 SP3-LTSS
Novell Inc. Suse Linux Enterprise Server 12 SP3-BCL
Novell Inc. Suse Linux Enterprise Server 12 SP5
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3-BCL
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3-LTSS
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP5
Novell Inc. Suse Linux Enterprise Server 12 SP3-ESPOS
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3-ESPOS
Novell Inc. Suse Linux Enterprise Server 15-LTSS
Novell Inc. OpenSUSE Leap 15.2
Novell Inc. Suse Linux Enterprise Server 12 SP4 LTSS
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP4-LTSS
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP4-ESPOS

Уровень опасности уязвимости

Низкий уровень опасности (базовая оценка CVSS 2.0 составляет 2,1)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,5)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для Linux:
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.161
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.92
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.244
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.244
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.7
Для Android:
https://source.android.com/security/bulletin/2020-09-01
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2020-0427/

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 39%
0.00166
Низкий

5.5 Medium

CVSS3

2.1 Low

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 5 лет назад

In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171

CVSS3: 5.5
redhat
больше 4 лет назад

In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171

CVSS3: 5.5
nvd
почти 5 лет назад

In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171

CVSS3: 5.5
debian
почти 5 лет назад

In create_pinctrl of core.c, there is a possible out of bounds read du ...

CVSS3: 5.5
github
около 3 лет назад

In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171

EPSS

Процентиль: 39%
0.00166
Низкий

5.5 Medium

CVSS3

2.1 Low

CVSS2