SB2014113002 - Input validation error in Linux kernel 



SB2014113002 - Input validation error in Linux kernel

Published: November 30, 2014 Updated: August 9, 2020

Security Bulletin ID SB2014113002
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2014-9090)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.


Remediation

Install update from vendor's website.