CVE-2019-11811:use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
High
|
zhao.shuai |
Bug Description
Brief Description
-----------------
A flaw was found in the Linux kernel's implementation of IPMI (remote baseband access). An attacker, with local access to read /proc/ioports, may be able to create a use-after-free condition when the kernel module is unloaded which may result in privilege escalation.
Find out more about CVE-2019-11811 from the MITRE CVE dictionary dictionary and NIST NVD.
Severity
--------
Major: System/Feature is usable but degraded
Steps to Reproduce
------------------
This flaw has been rated as "Moderate" as the attacker needs to be able to abuse this flaw in a very narrow race condition of the kernel module being unloaded. This scoring system from this flaw differentiates from other sources as the attacker must have a local account to be able to read the file (/proc/ioports) while the module is unloaded. None of the above actions are 'network facing' attack vectors.
Detailed description path
------------------
https:/
CVE References
Changed in starlingx: | |
status: | New → In Progress |
assignee: | nobody → zhao.shuai (zhao.shuai.neusoft) |
Changed in starlingx: | |
importance: | Undecided → High |
information type: | Private Security → Public Security |
information type: | Public Security → Public |
information type: | Public → Private Security |
This CVE meets the starlingx policy for providing a fix to stx.2.0 as well as master.