Vulnerability Name: | CVE-2014-2673 (CCN-92113) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2014-03-07 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2014-03-07 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2020-08-27 | ||||||||||||||||||||||||||||||||||||||||
Summary: | The arch_dup_task_struct function in the Transactional Memory (TM) implementation in arch/powerpc/kernel/process.c in the Linux kernel before 3.13.7 on the powerpc platform does not properly interact with the clone and fork system calls, which allows local users to cause a denial of service (Program Check and system crash) via certain instructions that are executed with the processor in the Transactional state. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.7 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C) 3.5 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
3.7 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-2673 Source: CONFIRM Type: Patch, Vendor Advisory http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=621b5060e823301d0cba4cb52a7ee3491922d291 Source: CCN Type: Linux Kernel GIT Repository powerpc/tm: Fix crash when forking inside a transaction Source: CCN Type: RHSA-2014-1023 Important: kernel security and bug fix update Source: CCN Type: SA57436 Linux Kernel PowerPC Fork/Clone Denial of Service Vulnerability Source: SECUNIA Type: Third Party Advisory 57436 Source: CONFIRM Type: Release Notes, Vendor Advisory http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.7 Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20140330 Re: CVE request: Linux Kernel, two security issues Source: BID Type: Third Party Advisory, VDB Entry 66477 Source: CCN Type: BID-66477 Linux Kernel 'arch_dup_task_struct()' Function Local Denial of Service Vulnerability Source: XF Type: Third Party Advisory, VDB Entry linux-kernel-cve20142673-dos(92113) Source: XF Type: UNKNOWN linux-kernel-cve20142673-dos(92113) Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/torvalds/linux/commit/621b5060e823301d0cba4cb52a7ee3491922d291 Source: CCN Type: ChangeLog-3.12.15 PNP / ACPI: proper handling of ACPI IO/Memory resource parsing failures Source: CONFIRM Type: Release Notes, Vendor Advisory https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.15 Source: CCN Type: ChangeLog-3.13.7 PNP / ACPI: proper handling of ACPI IO/Memory resource parsing failures | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |