From ${URL} : Linux kernel built for the ARM64(CONFIG_ARM64) platform is vulnerable to a crash when the processor generates trap/esr, that is not handled gracefully, which leads to bad_mode(), wherein it'll die() or oops(). A user/program could use this flaw to crash the kernel resulting in DoS. Upstream fixes: =============== -> https://git.kernel.org/linus/381cc2b9705512ee7c7f1839cbdde374625a2a9f -> https://git.kernel.org/linus/9955ac47f4ba1c95ecb6092aeaefb40a22e99268
CVE-2013-4220 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4220): The bad_mode function in arch/arm64/kernel/traps.c in the Linux kernel before 3.9.5 on the ARM64 platform allows local users to cause a denial of service (system crash) via vectors involving an attempted register access that triggers an unexpected value in the Exception Syndrome Register (ESR).
Fixes in 3.9.5 onwards