In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "5.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "5.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "5.0-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "5.0-rc4"
}
]
}[
{
"events": [
{
"introduced": "4.18"
},
{
"fixed": "4.19.18"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "4.20.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-9003.json"