CVE-2019-12456

NameCVE-2019-12456
Description** DISPUTED ** An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a "double fetch" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: local)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)jessie3.16.56-1+deb8u1vulnerable
jessie (security)3.16.72-1vulnerable
stretch4.9.168-1vulnerable
stretch (security)4.9.168-1+deb9u5vulnerable
buster4.19.37-5vulnerable
buster (security)4.19.37-5+deb10u2vulnerable
bullseye4.19.37-6vulnerable
sid5.2.9-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsource(unstable)(unfixed)unimportant

Notes

The double-fetched value is not used after the second fetch, thus an invalid issue
from security impact perspective. CVE should probably be rejected.

Search for package or bug name: Reporting problems