Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-0512

Опубликовано: 07 июн. 2021
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel

A flaw out of bounds memory write in the Linux kernel HID subsystem was found in the way user attach USB or other HID device that generates incorrect data inside HID report field. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.

Отчет

For Red Hat Enterprise Linux 7 only out of bounds memory read possible instead of write and no code that depends on this memory read, so considering the impact Moderate instead of Important. Both this has very low chances of being exploited in the wild: attacker either need to physically plug a malicious device in a USB port or attacker would have to use uhid or any other virtual USB implementation, meaning that likely already have root access be able to trigger that.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelWill not fix
Red Hat Enterprise Linux 7kernel-altWill not fix
Red Hat Enterprise Linux 7kernel-rtWill not fix
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2021:408802.11.2021
Red Hat Enterprise Linux 8kernelFixedRHSA-2021:405602.11.2021
Red Hat Enterprise Linux 8kpatch-patchFixedRHSA-2021:412203.11.2021
Red Hat Enterprise Linux 8.2 Extended Update Supportkernel-rtFixedRHSA-2021:344507.09.2021
Red Hat Enterprise Linux 8.2 Extended Update Supportkpatch-patchFixedRHSA-2021:344307.09.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-120->CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1974491kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c

EPSS

Процентиль: 8%
0.00032
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 4 года назад

In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel

CVSS3: 7.8
nvd
почти 4 года назад

In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel

CVSS3: 7.8
debian
почти 4 года назад

In __hidinput_change_resolution_multipliers of hid-input.c, there is a ...

suse-cvrf
почти 4 года назад

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP1)

github
около 3 лет назад

In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel

EPSS

Процентиль: 8%
0.00032
Низкий

7.8 High

CVSS3