6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
kernel-rt is vulnerable to arbitrary code execution. The vulnerability exists as an array index error in the logi_dj_raw_event
function could allow physical attackers to execute arbitrary code through the value of REPORT_TYPE_NOTIF_DEVICE_UNPAIRED
.
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ad3e14d7c5268c2e24477c6ef54bbdf88add5d36
rhn.redhat.com/errata/RHSA-2014-1318.html
www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2
www.openwall.com/lists/oss-security/2014/09/11/21
www.securityfocus.com/bid/69770
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1141210
code.google.com/p/google-security-research/issues/detail?id=89
github.com/torvalds/linux/commit/ad3e14d7c5268c2e24477c6ef54bbdf88add5d36
rhn.redhat.com/errata/RHSA-2014-1318.html