You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power."
CVE-2020-12652 - Medium Severity Vulnerability
Vulnerable Library - linuxv3.10
Linux kernel source tree
Library home page: https://github.com/torvalds/linux.git
Found in HEAD commit: 439d18b77a020411b95770ba08a9229eed466cde
Found in base branch: xsentinel-1.6-clean
Vulnerable Source Files (2)
android_kernel_samsung_j7xlte/drivers/message/fusion/mptctl.c
android_kernel_samsung_j7xlte/drivers/message/fusion/mptctl.c
Vulnerability Details
The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power."
Publish Date: 2020-05-05
URL: CVE-2020-12652
CVSS 3 Score Details (4.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14
Release Date: 2020-05-05
Fix Resolution: 5.4.14
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: