Описание
A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Ссылки
- Issue TrackingThird Party Advisory
- Mailing ListPatch
- Broken Link
- Issue TrackingThird Party Advisory
- Mailing ListPatch
- Broken Link
Уязвимые конфигурации
Одно из
EPSS
6.6 Medium
CVSS3
Дефекты
Связанные уязвимости
A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A memory corruption flaw was found in the Linux kernel\u2019s human in ...
A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Уязвимость подсистемы устройства пользовательского интерфейса (HID) (drivers/hid/hid-core.c) ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение работы приложения или повысить свои привилегии
EPSS
6.6 Medium
CVSS3