An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.
The product utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes.
Link | Tags |
---|---|
https://lkml.org/lkml/2020/2/3/559 | mailing list patch exploit technical description |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19b61392c5a852b4e8a0bf35aecb969983c5932d | mailing list patch vendor advisory exploit |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.17 | mailing list patch vendor advisory |
https://security.netapp.com/advisory/ntap-20200608-0001/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html | third party advisory mailing list |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html | mailing list third party advisory vendor advisory |
https://usn.ubuntu.com/4391-1/ | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html | mailing list third party advisory vendor advisory |