CVE-2009-0605
Publication date 17 February 2009
Last updated 24 July 2024
Ubuntu priority
Stack consumption vulnerability in the do_page_fault function in arch/x86/mm/fault.c in the Linux kernel before 2.6.28.5 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via unspecified vectors that trigger page faults on a machine that has a registered Kprobes probe.
From the Ubuntu Security Team
The page fault handler could consume stack memory. A local attacker could exploit this to crash the system or gain root privileges with a Kprobe registered.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-source-2.6.15 | ||
linux-source-2.6.22 | ||