Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html - | |
References | () http://marc.info/?l=linux-input&m=137772190214635&w=1Â - | |
References | () http://openwall.com/lists/oss-security/2013/08/28/13Â - | |
References | () http://www.securityfocus.com/bid/62044Â - | |
References | () http://www.ubuntu.com/usn/USN-2015-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2016-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2019-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2020-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2021-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2022-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2023-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2024-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2038-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2039-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2050-1Â - | |
References | () https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.54Â - |
07 Nov 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ubuntu.com/usn/USN-2050-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2019-1Â - | |
References | () http://www.securityfocus.com/bid/62044Â - | |
References | () http://www.ubuntu.com/usn/USN-2021-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2022-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2024-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2016-1Â - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html - | |
References | () http://openwall.com/lists/oss-security/2013/08/28/13Â - | |
References | () http://www.ubuntu.com/usn/USN-2020-1Â - | |
References | () https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.54Â - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html - | |
References | () http://www.ubuntu.com/usn/USN-2038-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2039-1Â - | |
References | () http://marc.info/?l=linux-input&m=137772190214635&w=1Â - | |
References | () http://www.ubuntu.com/usn/USN-2015-1Â - | |
References | () http://www.ubuntu.com/usn/USN-2023-1Â - |
Information
Published : 2013-09-16 13:01
Updated : 2024-11-21 01:52
NVD link : CVE-2013-2897
Mitre link : CVE-2013-2897
CVE.ORG link : CVE-2013-2897
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-20
Improper Input Validation