Vulnerability Description
Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 2.6.17 |
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%
- http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%
- http://secunia.com/advisories/24098
- http://secunia.com/advisories/25691
- http://secunia.com/advisories/26620
- http://secunia.com/advisories/26994
- http://secunia.com/advisories/32485
- http://www.debian.org/security/2007/dsa-1381
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.18
- http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.18-git13.log
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
- http://www.redhat.com/support/errata/RHSA-2008-0957.html
- http://www.securityfocus.com/archive/1/471457
- http://www.securityfocus.com/bid/26060
- http://www.ubuntu.com/usn/usn-416-1
FAQ
What is CVE-2006-5755?
CVE-2006-5755 is a vulnerability with a CVSS score of 4.9 (MEDIUM). Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing S...
How severe is CVE-2006-5755?
CVE-2006-5755 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5755?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.