{"id":"CVE-2019-12456","details":"An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used","modified":"2026-03-15T22:29:18.242507Z","published":"2019-05-30T14:29:01.890Z","related":["SUSE-SU-2019:1823-1","SUSE-SU-2019:1823-2","SUSE-SU-2019:1829-1","SUSE-SU-2019:1851-1","SUSE-SU-2019:1852-1","SUSE-SU-2019:1855-1","SUSE-SU-2019:1870-1","SUSE-SU-2019:2430-1","SUSE-SU-2019:2450-1","SUSE-SU-2020:14354-1","openSUSE-SU-2019:1571-1","openSUSE-SU-2019:1579-1"],"references":[{"type":"WEB","url":"https://support.f5.com/csp/article/K84310302"},{"type":"WEB","url":"https://support.f5.com/csp/article/K84310302?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/"},{"type":"ADVISORY","url":"https://lkml.org/lkml/2019/5/29/1164"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1717182"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.1.5"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-12456.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}