CVE-2019-12456

HIGH

Description

** DISPUTED ** An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a "double fetch" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used.

References

http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html

http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html

http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html

https://bugzilla.redhat.com/show_bug.cgi?id=1717182

https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e

https://lists.fedoraproject.org/archives/list/[email protected]/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/

https://lists.fedoraproject.org/archives/list/[email protected]/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/

https://lkml.org/lkml/2019/5/29/1164

Details

Source: MITRE

Published: 2019-05-30

Updated: 2019-06-20

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

CVSS v3.0

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.8

Severity: HIGH