vulnerability

SUSE: CVE-2021-0512: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
2021-06-21
Added
2021-07-09
Modified
2022-10-26

Description

In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel

Solution(s)

suse-upgrade-cluster-md-kmp-64kbsuse-upgrade-cluster-md-kmp-azuresuse-upgrade-cluster-md-kmp-defaultsuse-upgrade-cluster-md-kmp-preemptsuse-upgrade-dlm-kmp-64kbsuse-upgrade-dlm-kmp-azuresuse-upgrade-dlm-kmp-defaultsuse-upgrade-dlm-kmp-preemptsuse-upgrade-gfs2-kmp-64kbsuse-upgrade-gfs2-kmp-azuresuse-upgrade-gfs2-kmp-defaultsuse-upgrade-gfs2-kmp-preemptsuse-upgrade-kernel-64kbsuse-upgrade-kernel-64kb-develsuse-upgrade-kernel-64kb-extrasuse-upgrade-kernel-64kb-livepatch-develsuse-upgrade-kernel-64kb-optionalsuse-upgrade-kernel-azuresuse-upgrade-kernel-azure-basesuse-upgrade-kernel-azure-develsuse-upgrade-kernel-azure-extrasuse-upgrade-kernel-azure-livepatch-develsuse-upgrade-kernel-azure-optionalsuse-upgrade-kernel-bigmemsuse-upgrade-kernel-bigmem-basesuse-upgrade-kernel-bigmem-develsuse-upgrade-kernel-debugsuse-upgrade-kernel-debug-basesuse-upgrade-kernel-debug-develsuse-upgrade-kernel-debug-livepatch-develsuse-upgrade-kernel-defaultsuse-upgrade-kernel-default-basesuse-upgrade-kernel-default-base-rebuildsuse-upgrade-kernel-default-develsuse-upgrade-kernel-default-extrasuse-upgrade-kernel-default-kgraftsuse-upgrade-kernel-default-livepatchsuse-upgrade-kernel-default-livepatch-develsuse-upgrade-kernel-default-mansuse-upgrade-kernel-default-optionalsuse-upgrade-kernel-develsuse-upgrade-kernel-devel-azuresuse-upgrade-kernel-docssuse-upgrade-kernel-docs-htmlsuse-upgrade-kernel-ec2suse-upgrade-kernel-ec2-basesuse-upgrade-kernel-ec2-develsuse-upgrade-kernel-kvmsmallsuse-upgrade-kernel-kvmsmall-basesuse-upgrade-kernel-kvmsmall-develsuse-upgrade-kernel-kvmsmall-livepatch-develsuse-upgrade-kernel-livepatch-4_12_14-150_55-defaultsuse-upgrade-kernel-livepatch-4_12_14-150_58-defaultsuse-upgrade-kernel-livepatch-4_12_14-150_63-defaultsuse-upgrade-kernel-livepatch-4_12_14-150_66-defaultsuse-upgrade-kernel-livepatch-4_12_14-150_69-defaultsuse-upgrade-kernel-livepatch-4_12_14-150_72-defaultsuse-upgrade-kernel-livepatch-4_12_14-150_75-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_48-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_51-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_56-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_61-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_64-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_67-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_72-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_75-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_78-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_83-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_86-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_89-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_92-defaultsuse-upgrade-kernel-livepatch-4_12_14-197_99-defaultsuse-upgrade-kernel-livepatch-5_3_18-22-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_12-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_15-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_24-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_29-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_34-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_37-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_43-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_46-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_49-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_70-defaultsuse-upgrade-kernel-livepatch-5_3_18-24_9-defaultsuse-upgrade-kernel-livepatch-5_3_18-59_13-defaultsuse-upgrade-kernel-macrossuse-upgrade-kernel-obs-buildsuse-upgrade-kernel-obs-qasuse-upgrade-kernel-paesuse-upgrade-kernel-pae-basesuse-upgrade-kernel-pae-develsuse-upgrade-kernel-ppc64suse-upgrade-kernel-ppc64-basesuse-upgrade-kernel-ppc64-develsuse-upgrade-kernel-preemptsuse-upgrade-kernel-preempt-develsuse-upgrade-kernel-preempt-extrasuse-upgrade-kernel-preempt-livepatch-develsuse-upgrade-kernel-preempt-optionalsuse-upgrade-kernel-sourcesuse-upgrade-kernel-source-azuresuse-upgrade-kernel-source-vanillasuse-upgrade-kernel-symssuse-upgrade-kernel-syms-azuresuse-upgrade-kernel-tracesuse-upgrade-kernel-trace-basesuse-upgrade-kernel-trace-develsuse-upgrade-kernel-vanillasuse-upgrade-kernel-vanilla-basesuse-upgrade-kernel-vanilla-develsuse-upgrade-kernel-vanilla-livepatch-develsuse-upgrade-kernel-xensuse-upgrade-kernel-xen-basesuse-upgrade-kernel-xen-develsuse-upgrade-kernel-zfcpdumpsuse-upgrade-kernel-zfcpdump-mansuse-upgrade-kgraft-patch-4_4_180-94_127-defaultsuse-upgrade-kgraft-patch-4_4_180-94_130-defaultsuse-upgrade-kgraft-patch-4_4_180-94_135-defaultsuse-upgrade-kgraft-patch-4_4_180-94_138-defaultsuse-upgrade-kgraft-patch-4_4_180-94_141-defaultsuse-upgrade-kgraft-patch-4_4_180-94_144-defaultsuse-upgrade-kgraft-patch-4_4_180-94_147-defaultsuse-upgrade-kselftests-kmp-64kbsuse-upgrade-kselftests-kmp-azuresuse-upgrade-kselftests-kmp-defaultsuse-upgrade-kselftests-kmp-preemptsuse-upgrade-ocfs2-kmp-64kbsuse-upgrade-ocfs2-kmp-azuresuse-upgrade-ocfs2-kmp-defaultsuse-upgrade-ocfs2-kmp-preemptsuse-upgrade-reiserfs-kmp-64kbsuse-upgrade-reiserfs-kmp-azuresuse-upgrade-reiserfs-kmp-defaultsuse-upgrade-reiserfs-kmp-preempt
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.