First published: Tue May 07 2019(Updated: )
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=4.18<4.19.31 | |
Linux Linux kernel | >=4.20<5.0.4 | |
openSUSE Leap | =15.1 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Aus | =7.6 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Tus | =7.4 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/kernel-rt | <0:3.10.0-957.27.2.rt56.940.el7 | 0:3.10.0-957.27.2.rt56.940.el7 |
redhat/kernel | <0:3.10.0-957.27.2.el7 | 0:3.10.0-957.27.2.el7 |
redhat/kernel-alt | <0:4.14.0-115.26.1.el7a | 0:4.14.0-115.26.1.el7a |
redhat/kernel | <0:3.10.0-693.61.1.el7 | 0:3.10.0-693.61.1.el7 |
redhat/kernel | <0:3.10.0-862.46.1.el7 | 0:3.10.0-862.46.1.el7 |
redhat/kernel-rt | <0:4.18.0-80.7.1.rt9.153.el8_0 | 0:4.18.0-80.7.1.rt9.153.el8_0 |
redhat/kernel | <0:4.18.0-80.7.1.el8_0 | 0:4.18.0-80.7.1.el8_0 |
redhat/kernel-rt | <1:3.10.0-693.61.1.rt56.656.el6 | 1:3.10.0-693.61.1.rt56.656.el6 |
A mitigation to this flaw would be to no longer use IPMI on affected hardware until the kernel has been updated. Existing systems that have IPMI kernel modules loaded will need to unload the "ipmi_si" kernel module and blacklist ( See https://access.redhat.com/solutions/41278 for a guide on how to blacklist modules). Take careful consideration that if unloading and blacklisting the module, this creates a one-time attack vector window for a local attacker.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-11811 is a vulnerability in the Linux kernel that allows a use-after-free attack when attempting to read /proc/ioports after the ipmi_si module is removed.
CVE-2019-11811 has a severity level of high.
The affected software versions include kernel-rt 3.10.0-957.27.2.rt56.940.el7, kernel 3.10.0-957.27.2.el7, kernel-alt 4.14.0-115.26.1.el7a, and more.
To fix CVE-2019-11811, users should update their Linux kernel to a version that includes the necessary patch.
More information about CVE-2019-11811 can be found on the CVE and NVD websites, as well as Red Hat's Bugzilla and Errata pages.