Operation on a Resource after Expiration or Release in Linux kernel - CVE-2019-19602

 

Operation on a Resource after Expiration or Release in Linux kernel - CVE-2019-19602

Published: December 5, 2019 / Updated: July 17, 2020


Vulnerability identifier: #VU30560
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-19602
CWE-ID: CWE-672
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local authenticated user to #BASIC_IMPACT#.

fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc.


How to mitigate CVE-2019-19602

Install update from vendor's website.

Sources