Vigil@nce - Linux kernel: denial of service via get_wchan
January 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker on ARM can execute a program with several
threads, in order to trigger a denial of service of the Linux
kernel.
– Impacted products: Linux
– Severity: 1/4
– Creation date: 30/12/2013
DESCRIPTION OF THE VULNERABILITY
On an ARM processor, the arch/arm/kernel/process.c file manages
the execution of processes.
The get_wchan() function of process.c manages the stack. However,
it does not check if the stack pointer is valid before
dereferencing it.
A local attacker on ARM can therefore execute a program with
several threads, in order to trigger a denial of service of the
Linux kernel.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-get-wchan-14001