CVE-2019-11811

Current Description

An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.

Basic Data

PublishedMay 07, 2019
Last ModifiedMay 06, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-416
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score6.9
SeverityMEDIUM
Exploitability Score3.4
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********5.0.4
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSOpensuseLeap15.1*******
    2.3OSRedhatEnterprise Linux7.0*******
    2.3OSRedhatEnterprise Linux Aus7.6*******
    2.3OSRedhatEnterprise Linux Desktop7.0*******
    2.3OSRedhatEnterprise Linux Server7.0*******
    2.3OSRedhatEnterprise Linux Server Aus7.4*******
    2.3OSRedhatEnterprise Linux Server Tus7.4*******
    2.3OSRedhatEnterprise Linux Server Tus7.6*******
    2.3OSRedhatEnterprise Linux Workstation7.0*******

Vulnerable Software List

VendorProductVersions
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Tus 7.4, 7.6
Redhat Enterprise Linux Aus 7.6
Redhat Enterprise Linux Server 7.0
Opensuse Leap 15.1
Linux Linux Kernel *

References

NameSourceURLTags
openSUSE-SU-2019:1479http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.htmlSUSEThird Party Advisory
108410http://www.securityfocus.com/bid/108410BIDThird Party Advisory VDB Entry
RHSA-2019:1873https://access.redhat.com/errata/RHSA-2019:1873REDHATThird Party Advisory
RHSA-2019:1891https://access.redhat.com/errata/RHSA-2019:1891REDHATThird Party Advisory
RHSA-2019:1959https://access.redhat.com/errata/RHSA-2019:1959REDHATThird Party Advisory
RHSA-2019:1971https://access.redhat.com/errata/RHSA-2019:1971REDHATThird Party Advisory
RHSA-2019:4057https://access.redhat.com/errata/RHSA-2019:4057REDHATThird Party Advisory
RHSA-2019:4058https://access.redhat.com/errata/RHSA-2019:4058REDHATThird Party Advisory
RHSA-2020:0036https://access.redhat.com/errata/RHSA-2020:0036REDHATThird Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.4https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.4MISCRelease Notes Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=401e7e88d4ef80188ffa07095ac00456f901b8c4https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=401e7e88d4ef80188ffa07095MISCPatch Vendor Advisory
https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4MISCPatch Third Party Advisory
https://security.netapp.com/advisory/ntap-20190719-0003/https://security.netapp.com/advisory/ntap-20190719-0003/CONFIRMThird Party Advisory
https://support.f5.com/csp/article/K01512680https://support.f5.com/csp/article/K01512680CONFIRMThird Party Advisory