vulnerability
CentOS Linux: CVE-2021-0512: Important: kernel security, bug fix, and enhancement update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | 2021-06-21 | 2021-11-09 | 2023-05-25 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
2021-06-21
Added
2021-11-09
Modified
2023-05-25
Description
In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel
Solution(s)
centos-upgrade-kernelcentos-upgrade-kernel-rtcentos-upgrade-kpatch-patch-4_18_0-305centos-upgrade-kpatch-patch-4_18_0-305-debuginfocentos-upgrade-kpatch-patch-4_18_0-305-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_10_2centos-upgrade-kpatch-patch-4_18_0-305_10_2-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_10_2-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_12_1centos-upgrade-kpatch-patch-4_18_0-305_12_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_12_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_17_1centos-upgrade-kpatch-patch-4_18_0-305_17_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_17_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_19_1centos-upgrade-kpatch-patch-4_18_0-305_19_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_19_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_3_1centos-upgrade-kpatch-patch-4_18_0-305_3_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_3_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_7_1centos-upgrade-kpatch-patch-4_18_0-305_7_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_7_1-debugsource
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.