In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1885-1 | linux-4.9 security update |
Debian DSA |
DSA-4495-1 | linux security update |
Debian DSA |
DSA-4497-1 | linux security update |
EUVD |
EUVD-2019-5069 | In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c. |
Ubuntu USN |
USN-4114-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4115-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4116-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:57:39.580Z
Reserved: 2019-07-18T00:00:00
Link: CVE-2019-13648
No data.
Status : Modified
Published: 2019-07-19T13:15:12.797
Modified: 2024-11-21T04:25:26.117
Link: CVE-2019-13648
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN