blob: 3c21071d07d3ab466dda88dedc1584480a1dd2b1 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
|
Candidate: CVE-2006-5755
References:
http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=658fdbef66e5e9be79b457edc2cbbb3add840aa9
Description:
Linux kernel before 2.6.18, when running on x86_64 systems, does not
properly save or restore EFLAGS during a context switch, which allows
local users to cause a denial of service (crash) by causing SYSENTER
to set an NT flag, which can trigger a crash on the IRET of the next
task.
Ubuntu-Description:
The task switching code did not save and restore EFLAGS of processes.
By starting a specially crafted executable, a local attacker could
exploit this to eventually crash many other running processes. This
only affects the amd64 platform.
Notes:
jmm> 658fdbef66e5e9be79b457edc2cbbb3add840aa9
jmm> amd64 equivalent of CVE-2006-5173
jmm> http://www.mail-archive.com/kgdb-bugreport@lists.sourceforge.net/msg00559.html
dannf> marking sarge/2.4 N/A since we released no sarge/2.4/amd64 kernel
dannf> ignoring for sarge7 because backport is non-trivial
jmm> Affects xen
Bugs:
upstream: released (2.6.18)
linux-2.6: released (2.6.18-1)
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch4)
2.6.8-sarge-security: ignored (2.6.8-16sarge7)
2.4.27-sarge-security: N/A
2.6.12-breezy-security: released (2.6.12-10.43)
2.6.15-dapper-security: released (2.6.15-28.51)
2.6.17-edgy-security: released (2.6.17.1-11.35)
|