Stack consumption vulnerability in the do_page_fault function in
arch/x86/mm/fault.c in the Linux kernel before 188.8.131.52 allows local users
to cause a denial of service (memory corruption) or possibly gain
privileges via unspecified vectors that trigger page faults on a machine
that has a registered Kprobes probe.
The page fault handler could consume stack memory. A local attacker
could exploit this to crash the system or gain root privileges with a
jdsstrand> needs CONFIG_KPROBES set. Ubuntu 7.10 and after have this set.
Updated: 2015-10-17 03:32:03 UTC (commit 10086)