Vigil@nce - Linux kernel: memory corruption via double fetches
July 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can generate a memory corruption via a change in
pointers between 2 reads by the audio drivers of the Linux kernel,
in order to trigger a denial of service, and possibly to run code.
Impacted products: Linux.
Severity: 1/4.
Creation date: 29/06/2017.
DESCRIPTION OF THE VULNERABILITY
An attacker can generate a memory corruption via a change in
pointers between 2 reads by the audio drivers of the Linux kernel,
in order to trigger a denial of service, and possibly to run code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/Linux-kernel-memory-corruption-via-double-fetches-23102