vulnerability
CentOS Linux: CVE-2021-0512: Important: kernel security, bug fix, and enhancement update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Jun 21, 2021 | Nov 9, 2021 | May 25, 2023 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Jun 21, 2021
Added
Nov 9, 2021
Modified
May 25, 2023
Description
In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel
Solutions
centos-upgrade-kernelcentos-upgrade-kernel-rtcentos-upgrade-kpatch-patch-4_18_0-305centos-upgrade-kpatch-patch-4_18_0-305-debuginfocentos-upgrade-kpatch-patch-4_18_0-305-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_10_2centos-upgrade-kpatch-patch-4_18_0-305_10_2-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_10_2-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_12_1centos-upgrade-kpatch-patch-4_18_0-305_12_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_12_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_17_1centos-upgrade-kpatch-patch-4_18_0-305_17_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_17_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_19_1centos-upgrade-kpatch-patch-4_18_0-305_19_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_19_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_3_1centos-upgrade-kpatch-patch-4_18_0-305_3_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_3_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_7_1centos-upgrade-kpatch-patch-4_18_0-305_7_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_7_1-debugsource
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.