An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| linux | linux_kernel | 4.18 - 4.19.31 | - |
| linux | linux_kernel | 4.20 - 5.0.4 | - |
| opensuse | leap | - |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
11
Affected Products
28
References
linux / linux_kernel
| - |
| redhat | enterprise_linux | - | - |
| redhat | enterprise_linux_aus | - | - |
| redhat | enterprise_linux_desktop | - | - |
| redhat | enterprise_linux_server | - | - |
| redhat | enterprise_linux_server_aus | - | - |
| redhat | enterprise_linux_server_tus | - | - |
| redhat | enterprise_linux_server_tus | - | - |
| redhat | enterprise_linux_workstation | - | - |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact