CVE-2019-11811: kernel: use-after-free in IPMI
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
| StarlingX |
Critical
|
Robin Lu |
Bug Description
CVE-2019-11811
status : fixed
cvss2Score : 10
Attack Vector: N
Access Complexity : L
Autentication: N
Availability Impact :C
Affected packages:
['kernel', 'kernel-tools', 'kernel-
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/
https:/
CVE References
tags: | added: stx.security |
Changed in starlingx: | |
importance: | Undecided → Critical |
tags: | added: stx.3.0 |
Ghada Khalil (gkhalil) wrote : | #1 |
summary: |
- Fix CVE-2019-11811 + CVE-2019-11811: kernel: use-after-free in IPMI |
tags: | added: stx.2.0 |
Changed in starlingx: | |
assignee: | nobody → Ghada Khalil (gkhalil) |
status: | New → Invalid |
Ghada Khalil (gkhalil) wrote : | #2 |
Re-opening: Even though the current StarlingX kernel version (957.21.3) is not vulnerable to this CVE, the vulnerability maybe introduced when picking up a newer kernel to address the following CVEs:
https:/
https:/
Note: All open kernel CVEs should be investigated and addressed together.
Changed in starlingx: | |
status: | Invalid → Confirmed |
Changed in starlingx: | |
status: | Confirmed → Triaged |
Changed in starlingx: | |
assignee: | Ghada Khalil (gkhalil) → Cindy Xie (xxie1) |
Changed in starlingx: | |
assignee: | Cindy Xie (xxie1) → Lin Shuicheng (shuicheng) |
Lin Shuicheng (shuicheng) wrote : | #3 |
We are upgrading kernel to kernel-
https:/
So no extra work is needed for this CVE.
Ok, Thanks :)
Lin Shuicheng (shuicheng) wrote : | #5 |
Since both previous 957 and latest 1062 kernel doesn't have this CE issue.
I will close this issue as Invalid.
Feel free to add your comments if you have other idea.
Thanks.
Changed in starlingx: | |
status: | Triaged → Invalid |
Ghada Khalil (gkhalil) wrote : | #6 |
The vuls scanning tool is reporting this CVE for StarlingX. Given we are now picking up a version of the kernel (1062) that has the fix, I prefer to have this CVE / launchpad referenced in that commit and marked as Fix Released when the commit is merged.
Changed in starlingx: | |
status: | Invalid → Triaged |
assignee: | Lin Shuicheng (shuicheng) → Robin Lu (robinlu) |
Ghada Khalil (gkhalil) wrote : | #7 |
Assigning to Robin to link to his commits with the kernel upversion to 1062:
https:/
https:/
https:/
information type: | Private Security → Public Security |
Changed in starlingx: | |
status: | Triaged → In Progress |
This was previously reported in https:/ /bugs.launchpad .net/starlingx/ +bug/1840778
After further investigation, it was determined that StarlingX is not really vulnerable. See the details in the LP above. I think we can close this as a duplicate.