Candidate: CVE-2006-5755 References: http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=658fdbef66e5e9be79b457edc2cbbb3add840aa9 Description: Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task. Ubuntu-Description: The task switching code did not save and restore EFLAGS of processes. By starting a specially crafted executable, a local attacker could exploit this to eventually crash many other running processes. This only affects the amd64 platform. Notes: jmm> 658fdbef66e5e9be79b457edc2cbbb3add840aa9 jmm> amd64 equivalent of CVE-2006-5173 jmm> http://www.mail-archive.com/kgdb-bugreport@lists.sourceforge.net/msg00559.html dannf> marking sarge/2.4 N/A since we released no sarge/2.4/amd64 kernel dannf> ignoring for sarge7 because backport is non-trivial jmm> Affects xen Bugs: upstream: released (2.6.18) linux-2.6: released (2.6.18-1) 2.6.18-etch-security: released (2.6.18.dfsg.1-13etch4) 2.6.8-sarge-security: ignored (2.6.8-16sarge7) 2.4.27-sarge-security: N/A 2.6.12-breezy-security: released (2.6.12-10.43) 2.6.15-dapper-security: released (2.6.15-28.51) 2.6.17-edgy-security: released (2.6.17.1-11.35)