First published: Tue May 07 2019(Updated: )
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=4.18<4.19.31 | |
Linux Linux kernel | >=4.20<5.0.4 | |
openSUSE Leap | =15.1 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Aus | =7.6 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Tus | =7.4 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/kernel-rt | <0:3.10.0-957.27.2.rt56.940.el7 | 0:3.10.0-957.27.2.rt56.940.el7 |
redhat/kernel | <0:3.10.0-957.27.2.el7 | 0:3.10.0-957.27.2.el7 |
redhat/kernel-alt | <0:4.14.0-115.26.1.el7a | 0:4.14.0-115.26.1.el7a |
redhat/kernel | <0:3.10.0-693.61.1.el7 | 0:3.10.0-693.61.1.el7 |
redhat/kernel | <0:3.10.0-862.46.1.el7 | 0:3.10.0-862.46.1.el7 |
redhat/kernel-rt | <0:4.18.0-80.7.1.rt9.153.el8_0 | 0:4.18.0-80.7.1.rt9.153.el8_0 |
redhat/kernel | <0:4.18.0-80.7.1.el8_0 | 0:4.18.0-80.7.1.el8_0 |
redhat/kernel-rt | <1:3.10.0-693.61.1.rt56.656.el6 | 1:3.10.0-693.61.1.rt56.656.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-11811 is a vulnerability in the Linux kernel that allows a use-after-free attack when attempting to read /proc/ioports after the ipmi_si module is removed.
CVE-2019-11811 has a severity level of high.
The affected software versions include kernel-rt 3.10.0-957.27.2.rt56.940.el7, kernel 3.10.0-957.27.2.el7, kernel-alt 4.14.0-115.26.1.el7a, and more.
To fix CVE-2019-11811, users should update their Linux kernel to a version that includes the necessary patch.
More information about CVE-2019-11811 can be found on the CVE and NVD websites, as well as Red Hat's Bugzilla and Errata pages.