Description
CVE-2020-12652 - Medium Severity Vulnerability
Vulnerable Library - linuxv3.10
Linux kernel source tree
Library home page: https://github.com/torvalds/linux.git
Found in HEAD commit: ac11c9631a8abeed315b67913aab3ba7a400aef3
Found in base branch: cosmic-experimental-1.6
Vulnerable Source Files (2)
android_kernel_samsung_a3xelte/drivers/message/fusion/mptctl.c
android_kernel_samsung_a3xelte/drivers/message/fusion/mptctl.c
Vulnerability Details
The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power."
Publish Date: 2020-05-05
URL: CVE-2020-12652
CVSS 3 Score Details (4.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14
Release Date: 2020-05-05
Fix Resolution: 5.4.14
Step up your Open Source Security Game with WhiteSource here