Description
An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a "double fetch" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Wed, 16 Oct 2024 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
threat_severity
|
threat_severity
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:17:40.035Z
Reserved: 2019-05-30T00:00:00.000Z
Link: CVE-2019-12456
No data.
Status : Modified
Published: 2019-05-30T14:29:01.890
Modified: 2024-11-21T04:22:53.367
Link: CVE-2019-12456
OpenCVE Enrichment
No data.
Weaknesses