Vigil@nce - Linux kernel: NULL pointer dereference via tty_driver_lookup_tty
March 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can force a NULL pointer to be dereferenced via
/dev/pts/* on the Linux kernel, in order to trigger a denial of
service.
Impacted products: Linux
Severity: 1/4
Creation date: 16/03/2015
DESCRIPTION OF THE VULNERABILITY
The Linux kernel supports virtual terminals (CONFIG_VT).
However, the tty_open() function does not check if a pointer
returned by tty_driver_lookup_tty() is NULL, before using it.
A local attacker can therefore force a NULL pointer to be
dereferenced via /dev/pts/* on the Linux kernel, in order to
trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN