https://www.securityfocus.com/bid/108410
From the RedHat bug discussion:
https://bugzilla.redhat.com/show_bug.cgi?id=1709180
A flaw was found in the Linux kernels implementation of IPMI (remote baseband access) where an attacker with local access to read /proc/ioports may be able to create a use-after-free condition when the kernel module is unloaded. The use after-free condition may result in privilege escalation. Investigation is ongoing.
See https://security-tracker.debian.org/tracker/CVE-2019-11811 for a lot of other distro links (the Source section at the top).
(Score: 2) by RS3 on Tuesday July 23 2019, @12:18AM
Yes, I agree and I do that too, esp. for stable kernel releases. I was just pointing out that sometimes bugs are recent additions.
Can complex code ever be bug-free? Every now and then I read about a "race condition", which I know well in HW, but SW? Hmmm...