SB2014040115 - Input validation error in Linux kernel



SB2014040115 - Input validation error in Linux kernel

Published: April 1, 2014 Updated: August 10, 2020

Security Bulletin ID SB2014040115
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2014-2673)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The arch_dup_task_struct function in the Transactional Memory (TM) implementation in arch/powerpc/kernel/process.c in the Linux kernel before 3.13.7 on the powerpc platform does not properly interact with the clone and fork system calls, which allows local users to cause a denial of service (Program Check and system crash) via certain instructions that are executed with the processor in the Transactional state.


Remediation

Install update from vendor's website.