Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-20636

Опубликовано: 04 апр. 2020
Источник: redhat
CVSS3: 6.7
EPSS Низкий

Описание

In the Linux kernel before 5.4.12, drivers/input/input.c has out-of-bounds writes via a crafted keycode table, as demonstrated by input_set_keycode, aka CID-cb222aed03d7.

An out-of-bounds write flaw was found in the Linux kernel. A crafted keycode table could be used by drivers/input/input.c to perform the out-of-bounds write. A local user with root access can insert garbage to this keycode table that can lead to out-of-bounds memory access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

This issue was rated as having Moderate impact because of the need of physical access or administrator privileges to trigger it.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise MRG 2kernel-rtWill not fix
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2020:406229.09.2020
Red Hat Enterprise Linux 7kernel-altFixedRHSA-2020:285407.07.2020
Red Hat Enterprise Linux 7kernelFixedRHSA-2020:406029.09.2020
Red Hat Enterprise Linux 7.4 Advanced Update SupportkernelFixedRHSA-2020:543015.12.2020
Red Hat Enterprise Linux 7.4 Telco Extended Update SupportkernelFixedRHSA-2020:543015.12.2020
Red Hat Enterprise Linux 7.4 Update Services for SAP SolutionskernelFixedRHSA-2020:543015.12.2020
Red Hat Enterprise Linux 7.6 Extended Update SupportkernelFixedRHSA-2020:565622.12.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1824059kernel: out-of-bounds write via crafted keycode table

EPSS

Процентиль: 32%
0.00117
Низкий

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
ubuntu
около 5 лет назад

In the Linux kernel before 5.4.12, drivers/input/input.c has out-of-bounds writes via a crafted keycode table, as demonstrated by input_set_keycode, aka CID-cb222aed03d7.

CVSS3: 6.7
nvd
около 5 лет назад

In the Linux kernel before 5.4.12, drivers/input/input.c has out-of-bounds writes via a crafted keycode table, as demonstrated by input_set_keycode, aka CID-cb222aed03d7.

CVSS3: 6.7
debian
около 5 лет назад

In the Linux kernel before 5.4.12, drivers/input/input.c has out-of-bo ...

CVSS3: 6.7
github
около 3 лет назад

In the Linux kernel before 5.4.12, drivers/input/input.c has out-of-bounds writes via a crafted keycode table, as demonstrated by input_set_keycode, aka CID-cb222aed03d7.

CVSS3: 6.7
fstec
больше 5 лет назад

Уязвимость компонента drivers/input/input.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 32%
0.00117
Низкий

6.7 Medium

CVSS3