Bug 1920471 (CVE-2020-0465) - CVE-2020-0465 kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege
Summary: CVE-2020-0465 kernel: out of bounds write in hid-multitouch.c may lead to esc...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-0465
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1920472 1920848 1920849 1920850
Blocks: 1920473
TreeView+ depends on / blocked
 
Reported: 2021-01-26 11:38 UTC by Marian Rehak
Modified: 2022-03-03 15:57 UTC (History)
41 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel’s multi-touch input system. An out-of-bounds write triggered by a use-after-free issue could lead to memory corruption or possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Clone Of:
Environment:
Last Closed: 2022-03-02 22:21:13 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2022:0679 0 None None None 2022-02-24 20:40:44 UTC
Red Hat Product Errata RHBA-2022:0690 0 None None None 2022-02-28 14:16:31 UTC
Red Hat Product Errata RHBA-2022:0740 0 None None None 2022-03-03 15:57:44 UTC
Red Hat Product Errata RHSA-2022:0620 0 None None None 2022-02-22 16:57:42 UTC
Red Hat Product Errata RHSA-2022:0622 0 None None None 2022-02-22 17:00:11 UTC

Description Marian Rehak 2021-01-26 11:38:36 UTC
In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Reference:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35556bed836f8dc07ac55f69c8d17dce3e7f0e25

Comment 1 Marian Rehak 2021-01-26 11:40:04 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1920472]

Comment 2 Justin M. Forbes 2021-01-26 20:05:09 UTC
This issue was fixed for Fedora with the 5.8.7 stable kernel updates.

Comment 11 RaTasha Tillery-Smith 2021-02-16 19:33:16 UTC
Mitigation:

As the multitouch module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:

# echo "install hid-multitouch /bin/true" >> /etc/modprobe.d/disable-hid-multitouch.conf

The system may need to be restarted if the hid-multitouch module is loaded. In most circumstances, a kernel modules will be unable to be unloaded while in use.

If the system requires this module to work correctly, this mitigation may not be suitable.

If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.

Comment 24 errata-xmlrpc 2022-02-22 16:57:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:0620 https://access.redhat.com/errata/RHSA-2022:0620

Comment 25 errata-xmlrpc 2022-02-22 17:00:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:0622 https://access.redhat.com/errata/RHSA-2022:0622

Comment 26 Product Security DevOps Team 2022-03-02 22:21:08 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-0465


Note You need to log in before you can comment on or make changes to this bug.