Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-0465

Опубликовано: 18 янв. 2021
Источник: redhat
CVSS3: 6.6
EPSS Низкий

Описание

In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel

A flaw was found in the Linux kernel’s multi-touch input system. An out-of-bounds write triggered by a use-after-free issue could lead to memory corruption or possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Меры по смягчению последствий

As the multitouch module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:

echo "install hid-multitouch /bin/true" >> /etc/modprobe.d/disable-hid-multitouch.conf

The system may need to be restarted if the hid-multitouch module is loaded. In most circumstances, a kernel modules will be unable to be unloaded while in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernel-altOut of support scope
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2022:062222.02.2022
Red Hat Enterprise Linux 7kernelFixedRHSA-2022:062022.02.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1920471kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege

EPSS

Процентиль: 6%
0.00028
Низкий

6.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 4 лет назад

In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel

CVSS3: 6.8
nvd
больше 4 лет назад

In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel

CVSS3: 6.8
debian
больше 4 лет назад

In various methods of hid-multitouch.c, there is a possible out of bou ...

github
около 3 лет назад

In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel

suse-cvrf
больше 4 лет назад

Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)

EPSS

Процентиль: 6%
0.00028
Низкий

6.6 Medium

CVSS3