vulnerability
SUSE: CVE-2020-0465: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 2020-12-14 | 2021-01-13 | 2022-10-26 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
2020-12-14
Added
2021-01-13
Modified
2022-10-26
Description
In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel
Solution(s)
suse-upgrade-cluster-md-kmp-defaultsuse-upgrade-cluster-md-kmp-rtsuse-upgrade-cluster-md-kmp-rt_debugsuse-upgrade-cluster-network-kmp-defaultsuse-upgrade-dlm-kmp-defaultsuse-upgrade-dlm-kmp-rtsuse-upgrade-dlm-kmp-rt_debugsuse-upgrade-gfs2-kmp-defaultsuse-upgrade-gfs2-kmp-rtsuse-upgrade-gfs2-kmp-rt_debugsuse-upgrade-kernel-64kbsuse-upgrade-kernel-64kb-develsuse-upgrade-kernel-64kb-extrasuse-upgrade-kernel-64kb-optionalsuse-upgrade-kernel-azuresuse-upgrade-kernel-azure-basesuse-upgrade-kernel-azure-develsuse-upgrade-kernel-bigmemsuse-upgrade-kernel-bigmem-basesuse-upgrade-kernel-bigmem-develsuse-upgrade-kernel-debugsuse-upgrade-kernel-debug-basesuse-upgrade-kernel-debug-develsuse-upgrade-kernel-defaultsuse-upgrade-kernel-default-basesuse-upgrade-kernel-default-develsuse-upgrade-kernel-default-extrasuse-upgrade-kernel-default-kgraftsuse-upgrade-kernel-default-livepatchsuse-upgrade-kernel-default-livepatch-develsuse-upgrade-kernel-default-mansuse-upgrade-kernel-default-optionalsuse-upgrade-kernel-develsuse-upgrade-kernel-devel-azuresuse-upgrade-kernel-devel-rtsuse-upgrade-kernel-docssuse-upgrade-kernel-docs-htmlsuse-upgrade-kernel-ec2suse-upgrade-kernel-ec2-basesuse-upgrade-kernel-ec2-develsuse-upgrade-kernel-kvmsmallsuse-upgrade-kernel-kvmsmall-basesuse-upgrade-kernel-kvmsmall-develsuse-upgrade-kernel-livepatch-4_12_14-150_52-defaultsuse-upgrade-kernel-livepatch-4_12_14-150_55-defaultsuse-upgrade-kernel-livepatch-4_12_14-150_58-defaultsuse-upgrade-kernel-livepatch-4_12_14-150_63-defaultsuse-upgrade-kernel-livepatch-4_12_14-150_66-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_34-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_37-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_40-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_45-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_48-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_51-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_56-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_61-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_64-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_67-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_72-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_75-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_78-defaultsuse-upgrade-kernel-livepatch-5_3_18-22-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_12-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_15-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_46-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_9-defaultsuse-upgrade-kernel-macrossuse-upgrade-kernel-obs-buildsuse-upgrade-kernel-obs-qasuse-upgrade-kernel-paesuse-upgrade-kernel-pae-basesuse-upgrade-kernel-pae-develsuse-upgrade-kernel-ppc64suse-upgrade-kernel-ppc64-basesuse-upgrade-kernel-ppc64-develsuse-upgrade-kernel-preemptsuse-upgrade-kernel-preempt-develsuse-upgrade-kernel-preempt-extrasuse-upgrade-kernel-preempt-optionalsuse-upgrade-kernel-rtsuse-upgrade-kernel-rt-develsuse-upgrade-kernel-rt-extrasuse-upgrade-kernel-rt_debugsuse-upgrade-kernel-rt_debug-develsuse-upgrade-kernel-rt_debug-extrasuse-upgrade-kernel-sourcesuse-upgrade-kernel-source-azuresuse-upgrade-kernel-source-rtsuse-upgrade-kernel-source-vanillasuse-upgrade-kernel-symssuse-upgrade-kernel-syms-azuresuse-upgrade-kernel-syms-rtsuse-upgrade-kernel-tracesuse-upgrade-kernel-trace-basesuse-upgrade-kernel-trace-develsuse-upgrade-kernel-vanillasuse-upgrade-kernel-vanilla-basesuse-upgrade-kernel-vanilla-develsuse-upgrade-kernel-xensuse-upgrade-kernel-xen-basesuse-upgrade-kernel-xen-develsuse-upgrade-kernel-zfcpdumpsuse-upgrade-kgraft-patch-4_4_121-92_129-defaultsuse-upgrade-kgraft-patch-4_4_121-92_135-defaultsuse-upgrade-kgraft-patch-4_4_121-92_138-defaultsuse-upgrade-kgraft-patch-4_4_121-92_141-defaultsuse-upgrade-kgraft-patch-4_4_121-92_146-defaultsuse-upgrade-kgraft-patch-4_4_121-92_149-defaultsuse-upgrade-kgraft-patch-4_4_180-94_116-defaultsuse-upgrade-kgraft-patch-4_4_180-94_121-defaultsuse-upgrade-kgraft-patch-4_4_180-94_124-defaultsuse-upgrade-kgraft-patch-4_4_180-94_127-defaultsuse-upgrade-kgraft-patch-4_4_180-94_130-defaultsuse-upgrade-kgraft-patch-4_4_180-94_135-defaultsuse-upgrade-kgraft-patch-4_4_180-94_138-defaultsuse-upgrade-kselftests-kmp-rtsuse-upgrade-kselftests-kmp-rt_debugsuse-upgrade-ocfs2-kmp-defaultsuse-upgrade-ocfs2-kmp-rtsuse-upgrade-ocfs2-kmp-rt_debugsuse-upgrade-reiserfs-kmp-defaultsuse-upgrade-reiserfs-kmp-rtsuse-upgrade-reiserfs-kmp-rt_debug

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.