A vulnerability was found in on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (Transaction Memory exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c. Reference: https://patchwork.ozlabs.org/patch/1133904/ https://git.kernel.org/torvalds/c/f16d80b75a096c52354c6e0a574993f3b0dfbdfe https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/tools/testing/selftests/powerpc/signal/sigfuz.c?h=v5.2
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1735631]
Red hat Enterprise Linux 7 kernels before kernel-3.10.0-1065.el7 were affected by this flaw.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1016 https://access.redhat.com/errata/RHSA-2020:1016
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2020:3019 https://access.redhat.com/errata/RHSA-2020:3019
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-13648