Vigil@nce - Linux kernel: buffer overflow via fbcon_redraw_softback, analyzed on 15/09/2020

Vigil@nce - Linux kernel: buffer overflow via fbcon_redraw_softback, analyzed on 15/09/2020

Synthesis of the vulnerability 


An attacker can trigger a buffer overflow via fbcon_redraw_softback() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.Impacted products: Debian, Linux, openSUSE Leap, Slackware, SUSE Linux Enterprise Desktop, SLES.Severity of this bulletin: 2/4.Creation date: 15/09/2020.Références of this threat: CERTFR-2020-AVI-614, CERTFR-2020-AVI-625, CERTFR-2020-AVI-642, CERTFR-2020-AVI-672, CERTFR-2020-AVI-678, CERTFR-2020-AVI-699, CVE-2020-14390, DLA-2385-1, DLA-2420-1, DLA-2420-2, openSUSE-SU-2020:1586-1, openSUSE-SU-2020:1655-1, SSA:2020-295-01, SUSE-SU-2020:2879-1, SUSE-SU-2020:2904-1, SUSE-SU-2020:2905-1, SUSE-SU-2020:2906-1, SUSE-SU-2020:2907-1, SUSE-SU-2020:2908-1, SUSE-SU-2020:2999-1, SUSE-SU-2020:3014-1, VIGILANCE-VUL-33321.

Description of the vulnerability 


An attacker can trigger a buffer overflow via fbcon_redraw_softback() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity alert impacts software or systems such as vigil linux kernel buffer overflow fbcon redraw softback analyzed