First published: Thu Sep 17 2020(Updated: )
A flaw out of bounds write in the Linux kernel human interface devices subsystem was found in the way user calls find key code by index. A local user could use this flaw to crash the system or escalate privileges on the system.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-305.rt7.72.el8 | 0:4.18.0-305.rt7.72.el8 |
redhat/kernel | <0:4.18.0-305.el8 | 0:4.18.0-305.el8 |
Google Android | ||
openSUSE | =15.1 | |
openSUSE | =15.2 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-0431 is considered a high severity vulnerability that could lead to system crashes or privilege escalation.
To address CVE-2020-0431, ensure that your system is updated to kernel version 4.18.0-305.rt7.72.el8 or 4.18.0-305.el8.
CVE-2020-0431 affects systems running specific versions of the Linux kernel, including those from Red Hat and openSUSE.
Vulnerable systems include certain versions of the Linux kernel used in Red Hat, openSUSE, and Google Android.
CVE-2020-0431 requires local access to the system for exploitation, making it less likely to be exploited remotely.