Vulnerability Description
In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | - | |
| Opensuse | Leap | 15.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.htmlMailing ListThird Party Advisory
- https://source.android.com/security/bulletin/pixel/2020-09-01PatchVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.htmlMailing ListThird Party Advisory
- https://source.android.com/security/bulletin/pixel/2020-09-01PatchVendor Advisory
FAQ
What is CVE-2020-0432?
CVE-2020-0432 is a vulnerability with a CVSS score of 7.8 (HIGH). In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. Us...
How severe is CVE-2020-0432?
CVE-2020-0432 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-0432?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android, Opensuse Leap.