summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-5755
blob: 3c21071d07d3ab466dda88dedc1584480a1dd2b1 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Candidate: CVE-2006-5755
References:
 http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=658fdbef66e5e9be79b457edc2cbbb3add840aa9
Description: 
 Linux kernel before 2.6.18, when running on x86_64 systems, does not
 properly save or restore EFLAGS during a context switch, which allows
 local users to cause a denial of service (crash) by causing SYSENTER
 to set an NT flag, which can trigger a crash on the IRET of the next
 task.
Ubuntu-Description: 
 The task switching code did not save and restore EFLAGS of processes.
 By starting a specially crafted executable, a local attacker could
 exploit this to eventually crash many other running processes. This
 only affects the amd64 platform.
Notes: 
 jmm> 658fdbef66e5e9be79b457edc2cbbb3add840aa9
 jmm> amd64 equivalent of CVE-2006-5173
 jmm> http://www.mail-archive.com/kgdb-bugreport@lists.sourceforge.net/msg00559.html
 dannf> marking sarge/2.4 N/A since we released no sarge/2.4/amd64 kernel
 dannf> ignoring for sarge7 because backport is non-trivial
 jmm> Affects xen
Bugs: 
upstream: released (2.6.18)
linux-2.6: released (2.6.18-1)
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch4)
2.6.8-sarge-security: ignored (2.6.8-16sarge7)
2.4.27-sarge-security: N/A
2.6.12-breezy-security: released (2.6.12-10.43)
2.6.15-dapper-security: released (2.6.15-28.51)
2.6.17-edgy-security: released (2.6.17.1-11.35)

© 2014-2024 Faster IT GmbH | imprint | privacy policy