SB2019110739 - Input validation error in Linux kernel



SB2019110739 - Input validation error in Linux kernel

Published: November 7, 2019 Updated: August 8, 2020

Security Bulletin ID SB2019110739
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2007-3732)

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

In Linux 2.6 before 2.6.23, the TRACE_IRQS_ON function in iret_exc calls a C function without ensuring that the segments are set properly. The kernel's %fs needs to be restored before the call in TRACE_IRQS_ON and before enabling interrupts, so that "current" references work. Without this, "current" used in the window between iret_exc and the middle of error_code where %fs is reset, would crash.


Remediation

Install update from vendor's website.