0.001 Low
EPSS
Percentile
25.5%
openrazer is vulnerable to Out-of-bounds Read. This allows an attacker using a malicious USB device to bypass ‘KASLR’ by leakng stack addresses within ‘razer_attr_read_dpi_stages’ leading to the out-of-bounds read vulnerability.
github.com/openrazer/openrazer/commit/33aa7f07d54ae066f201c6d298cb4a2181cb90e6
github.com/openrazer/openrazer/security/advisories/GHSA-39hg-jvc9-fg7h
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/v3.18/community.yaml