CVE-2009-0605

Publication date 17 February 2009

Last updated 24 July 2024


Ubuntu priority

Stack consumption vulnerability in the do_page_fault function in arch/x86/mm/fault.c in the Linux kernel before 2.6.28.5 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via unspecified vectors that trigger page faults on a machine that has a registered Kprobes probe.

From the Ubuntu Security Team

The page fault handler could consume stack memory. A local attacker could exploit this to crash the system or gain root privileges with a Kprobe registered.

Read the notes from the security team

Status

Package Ubuntu Release Status
linux 8.10 intrepid
Fixed 2.6.27-11.31
8.04 LTS hardy
Fixed 2.6.24-23.52
7.10 gutsy Not in release
6.06 LTS dapper Not in release
linux-source-2.6.15 8.10 intrepid Not in release
8.04 LTS hardy Not in release
7.10 gutsy Not in release
6.06 LTS dapper
Not affected
linux-source-2.6.22 8.10 intrepid Not in release
8.04 LTS hardy Not in release
7.10 gutsy
Fixed 2.6.22-16.62
6.06 LTS dapper Not in release

Notes


jdsstrand

needs CONFIG_KPROBES set. Ubuntu 7.10 and after have this set.

References

Related Ubuntu Security Notices (USN)

    • USN-751-1
    • Linux kernel vulnerabilities
    • 6 April 2009

Other references