Linux kernel is vulnerable to an out-of-bounds write. Crafted keycode table in drivers/input/input.c
enables the possibility of an attack.
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index
access.redhat.com/errata/RHSA-2020:4609
access.redhat.com/security/updates/classification/#moderate
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.12
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb222aed03d798fc074be55e59d9a112338ee784
github.com/torvalds/linux/commit/cb222aed03d798fc074be55e59d9a112338ee784
lists.debian.org/debian-lts-announce/2020/06/msg00011.html
lists.debian.org/debian-lts-announce/2020/06/msg00013.html
security.netapp.com/advisory/ntap-20200430-0004/