summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-5755
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2008-04-04 08:22:59 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2008-04-04 08:22:59 +0000
commite824eab7fea625551e3ee27c390cf894cfbfba04 (patch)
tree239de3139175e9b98d4e2a45e1962aa10beb2e92 /retired/CVE-2006-5755
parent60ddf7542af3875373d9827c167f1d51926a8f6d (diff)
retire some issues now that Sarge support has ended
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1154 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-5755')
-rw-r--r--retired/CVE-2006-575530
1 files changed, 30 insertions, 0 deletions
diff --git a/retired/CVE-2006-5755 b/retired/CVE-2006-5755
new file mode 100644
index 00000000..3c21071d
--- /dev/null
+++ b/retired/CVE-2006-5755
@@ -0,0 +1,30 @@
+Candidate: CVE-2006-5755
+References:
+ http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=658fdbef66e5e9be79b457edc2cbbb3add840aa9
+Description:
+ Linux kernel before 2.6.18, when running on x86_64 systems, does not
+ properly save or restore EFLAGS during a context switch, which allows
+ local users to cause a denial of service (crash) by causing SYSENTER
+ to set an NT flag, which can trigger a crash on the IRET of the next
+ task.
+Ubuntu-Description:
+ The task switching code did not save and restore EFLAGS of processes.
+ By starting a specially crafted executable, a local attacker could
+ exploit this to eventually crash many other running processes. This
+ only affects the amd64 platform.
+Notes:
+ jmm> 658fdbef66e5e9be79b457edc2cbbb3add840aa9
+ jmm> amd64 equivalent of CVE-2006-5173
+ jmm> http://www.mail-archive.com/kgdb-bugreport@lists.sourceforge.net/msg00559.html
+ dannf> marking sarge/2.4 N/A since we released no sarge/2.4/amd64 kernel
+ dannf> ignoring for sarge7 because backport is non-trivial
+ jmm> Affects xen
+Bugs:
+upstream: released (2.6.18)
+linux-2.6: released (2.6.18-1)
+2.6.18-etch-security: released (2.6.18.dfsg.1-13etch4)
+2.6.8-sarge-security: ignored (2.6.8-16sarge7)
+2.4.27-sarge-security: N/A
+2.6.12-breezy-security: released (2.6.12-10.43)
+2.6.15-dapper-security: released (2.6.15-28.51)
+2.6.17-edgy-security: released (2.6.17.1-11.35)

© 2014-2024 Faster IT GmbH | imprint | privacy policy