First published: Tue Sep 08 2020(Updated: )
A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
Google Android | ||
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Network Exposure Function | =22.1.1 | |
Oracle Communications Cloud Native Core Policy | =22.2.0 | |
Google Android |
To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-0404 is a high severity vulnerability in the Linux kernel for USB Video Class driver functionality.
CVE-2020-0404 can lead to local escalation of privilege in the kernel with no additional execution privileges needed.
No, user interaction is not needed for exploitation of CVE-2020-0404.
To fix CVE-2020-0404, update the affected software to versions 4.18.0-372.9.1.rt7.166.el8 for kernel-rt or 4.18.0-372.9.1.el8 for kernel.
You can find more information about CVE-2020-0404 at the following references: - [Commit on Git Kernel](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527) - [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1919792) - [Red Hat Access Solution](https://access.redhat.com/solutions/41278)