Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-13648 |
CWE-ID | CWE-399 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU19387
Risk: Medium
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-13648
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service (DoS) attack.
The vulnerability exists in the "arch/powerpc/kernel/signal_32.c" and "arch/powerpc/kernel/signal_64.c" files on the PowerPC platform, when hardware transactional memory is disabled. A local authenticated attacker can make a "sigreturn()" system call that sends a signal frame that sends a signal frame that submits malicious input to the targeted system and cause a denial of service condition.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.4 - 5.2.4
CPE2.3https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=c7ce5fe9288c5692fa456a8...
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.187
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.187
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.5
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.63
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.135
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.187
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.187
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.