From ${URL} : Description Konstantin Khlebnikov has reported a vulnerability in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the "get_wchan()" function (arch/arm/kernel/process.c) when unwinding stack frames and can be exploited to cause a kernel oops. Successful exploitation requires a Linux Kernel built with CONFIG_SMP support and running on ARM. The vulnerability is reported in versions 2.6.32.61, 2.6.34.14, 3.2.53, 3.4.75, 3.10.25, and 3.12.6. Solution: Fixed in the source code repository. Further details available to Secunia VIM customers Provided and/or discovered by: Konstantin Khlebnikov via a commit. Additionally reported by ykrocku via StackOverflow. Original Advisory: Konstantin Khlebnikov: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b15ec7a7427d4188ba91b9bbac696250a059d22 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3abb6671a9c04479c4bd026798a05f857393b7e2
In 3.12.6 onward