SB2019071907 - Resource management error in Linux kernel
Published: July 19, 2019 Updated: May 30, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Resource management error (CVE-ID: CVE-2019-13648)
The vulnerability allows a local attacker to perform a denial of service (DoS) attack.
The vulnerability exists in the "arch/powerpc/kernel/signal_32.c" and "arch/powerpc/kernel/signal_64.c" files on the PowerPC platform, when hardware transactional memory is disabled. A local authenticated attacker can make a "sigreturn()" system call that sends a signal frame that sends a signal frame that submits malicious input to the targeted system and cause a denial of service condition.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=c7ce5fe9288c5692fa456a8...
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.187
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.187
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.5
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.63
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.135
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3