First published: Tue Sep 05 2017(Updated: )
It was found that the driver_override implementation in base/platform.c is susceptible to race condition when different threads are reading vs storing a different driver override. Upstream patch: <a href="https://github.com/torvalds/linux/commit/6265539776a0810b7ce6398c27866ddb9c6bd154">https://github.com/torvalds/linux/commit/6265539776a0810b7ce6398c27866ddb9c6bd154</a> Introduced by commit: <a href="https://github.com/torvalds/linux/commit/3d713e0e382e">https://github.com/torvalds/linux/commit/3d713e0e382e</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.17<3.18.61 | |
Linux Linux kernel | >=3.19<4.1.43 | |
Linux Linux kernel | >=4.2<4.4.77 | |
Linux Linux kernel | >=4.5<4.9.37 | |
Linux Linux kernel | >=4.10<4.11.10 | |
Linux Linux kernel | >=4.12<4.12.1 | |
redhat/kernel | <4.13 | 4.13 |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.7-1 6.11.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12146 is a vulnerability in the Linux kernel that allows local users to gain privileges by exploiting a race condition in the driver_override implementation.
CVE-2017-12146 has a severity level of medium.
To fix CVE-2017-12146, you should update your Linux kernel to version 4.12.1 or later.
Yes, you can find references for CVE-2017-12146 in the following links: [Link 1](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6265539776a0810b7ce6398c27866ddb9c6bd154), [Link 2](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.1), [Link 3](https://bugzilla.redhat.com/show_bug.cgi?id=1489078)
CVE-2017-12146 is classified as CWE-362.