An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2019-11811 - High Severity Vulnerability
Vulnerable Library - linux179e72b561d3d331c850e1a5779688d7a7de5246
Linux kernel stable tree mirror
Library home page: https://github.com/gregkh/linux.git
Found in base branch: master
Vulnerable Source Files (2)
/drivers/char/ipmi/ipmi_si_intf.c /drivers/char/ipmi/ipmi_si_intf.c
Vulnerability Details
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
Publish Date: 2019-05-07
URL: CVE-2019-11811
CVSS 3 Score Details (7.0)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811
Release Date: 2019-05-07
Fix Resolution: v5.1-rc1
Step up your Open Source Security Game with Mend here