CVE-2020-11725Kernel vulnerability

8 documents7 sources
Severity
7.8HIGHNVD
EPSS
0.1%
top 68.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 12
Latest updateMay 24

Description

snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line, which later affects a private_size*count multiplication for unspecified "interesting side effects." NOTE: kernel engineers dispute this finding, because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the "owner" concept. The existing callers, SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPL

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

🔴Vulnerability Details

2
GHSA
GHSA-xqgg-8qqr-cmpg: snd_ctl_elem_add in sound/core/control2022-05-24
OSV
CVE-2020-11725: snd_ctl_elem_add in sound/core/control2020-04-12

📋Vendor Advisories

3
Microsoft
snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line which later affects a private_size*count multiplication for unspecified "interesting side effect2020-04-14
Red Hat
kernel: improper handling of private_size*count multiplication due to count=info->owner typo2020-04-12
Debian
CVE-2020-11725: linux - snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a...2020

💬Community

2
Bugzilla
CVE-2020-11725 kernel: improper handling of private_size*count multiplication due to count=info->owner typo2020-04-16
Bugzilla
CVE-2020-11725 kernel: improper handling of private_size*count multiplication due to count=info->owner typo [fedora-all]2020-04-16