CVE-2020-12652

The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power."
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:59

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html - () http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html -
References () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14 - Release Notes, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14 - Release Notes, Vendor Advisory
References () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=28d76df18f0ad5bcf5fa48510b225f0ed262a99b - Patch, Vendor Advisory () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=28d76df18f0ad5bcf5fa48510b225f0ed262a99b - Patch, Vendor Advisory
References () https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99b - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99b - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html - () https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html -
References () https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html - () https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html -
References () https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html - () https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html -
References () https://security.netapp.com/advisory/ntap-20200608-0001/ - () https://security.netapp.com/advisory/ntap-20200608-0001/ -
References () https://www.debian.org/security/2020/dsa-4698 - () https://www.debian.org/security/2020/dsa-4698 -

Information

Published : 2020-05-05 05:15

Updated : 2024-11-21 04:59


NVD link : CVE-2020-12652

Mitre link : CVE-2020-12652

CVE.ORG link : CVE-2020-12652


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')