Wind River Support Network

HomeOther DownloadsSecurity Advisory - Linux - CVE-2009-0605
Recommended Type: Patch

Security Advisory - Linux - CVE-2009-0605

Released: Apr 28, 2009     Updated: Apr 28, 2009

Description

Stack consumption vulnerability in the do_page_fault function in arch/x86/mm/fault.c in the Linux kernel before 2.6.28.5 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via unspecified vectors that trigger page faults on a machine that has a registered Kprobes probe.


Product Version

Linux Platforms 1.x

Downloads


Installation Notes

Installation Notes

WIND00159114.zip is for 1.4
WIND00159121.zip is for 1.5
1. Unzip the patch under [install_dir]/updates 
2. Install the patch CD by entering the patch CD directory and run setup_linux. 
3. This is a source only patch so you will have to build the kernel 
4. Issue a make fs and make the kernel in a configured directory. 
5. Upload the kernel and rootfs into the target and boot it up.


Live chat
Online