In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
2019-02-22T15:29:00.550
2024-11-21T04:50:47.627
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:C
10.0
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 4.19.18 | Yes |
Operating System | linux | linux_kernel | < 4.20.5 | Yes |
Operating System | linux | linux_kernel | 5.0 | Yes |
Operating System | linux | linux_kernel | 5.0 | Yes |
Operating System | linux | linux_kernel | 5.0 | Yes |
Operating System | linux | linux_kernel | 5.0 | Yes |
Application | netapp | hci_management_node | - | Yes |
Application | netapp | snapprotect | - | Yes |
Application | netapp | solidfire | - | Yes |
Operating System | netapp | cn1610_firmware | - | Yes |
Hardware | netapp | cn1610 | - | No |
Operating System | canonical | ubuntu_linux | 18.04 | Yes |
Operating System | canonical | ubuntu_linux | 18.10 | Yes |
Operating System | opensuse | leap | 15.0 | Yes |