Stack consumption vulnerability in the do_page_fault function in
arch/x86/mm/fault.c in the Linux kernel before 18.104.22.168 allows local users
to cause a denial of service (memory corruption) or possibly gain
privileges via unspecified vectors that trigger page faults on a machine
that has a registered Kprobes probe.
The page fault handler could consume stack memory. A local attacker
could exploit this to crash the system or gain root privileges with a
jdsstrand> needs CONFIG_KPROBES set. Ubuntu 7.10 and after have this set.
Updated: 2016-03-23 03:33:31 UTC (commit 10817)