CVE-2006-0744

Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
References
Link Resource
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5
http://lwn.net/Alerts/180820/
http://secunia.com/advisories/19639 Vendor Advisory
http://secunia.com/advisories/19735 Vendor Advisory
http://secunia.com/advisories/20157 Vendor Advisory
http://secunia.com/advisories/20237 Vendor Advisory
http://secunia.com/advisories/20398
http://secunia.com/advisories/20716 Vendor Advisory
http://secunia.com/advisories/20914 Vendor Advisory
http://secunia.com/advisories/21136 Vendor Advisory
http://secunia.com/advisories/21179 Vendor Advisory
http://secunia.com/advisories/21498 Vendor Advisory
http://secunia.com/advisories/21745 Vendor Advisory
http://secunia.com/advisories/21983 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
http://www.debian.org/security/2006/dsa-1103
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
http://www.osvdb.org/24639
http://www.redhat.com/support/errata/RHSA-2006-0437.html
http://www.redhat.com/support/errata/RHSA-2006-0493.html
http://www.securityfocus.com/bid/17541
http://www.ubuntu.com/usn/usn-302-1
http://www.vupen.com/english/advisories/2006/1390
http://www.vupen.com/english/advisories/2006/1475
http://www.vupen.com/english/advisories/2006/2554
https://exchange.xforce.ibmcloud.com/vulnerabilities/25869
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9732
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5
http://lwn.net/Alerts/180820/
http://secunia.com/advisories/19639 Vendor Advisory
http://secunia.com/advisories/19735 Vendor Advisory
http://secunia.com/advisories/20157 Vendor Advisory
http://secunia.com/advisories/20237 Vendor Advisory
http://secunia.com/advisories/20398
http://secunia.com/advisories/20716 Vendor Advisory
http://secunia.com/advisories/20914 Vendor Advisory
http://secunia.com/advisories/21136 Vendor Advisory
http://secunia.com/advisories/21179 Vendor Advisory
http://secunia.com/advisories/21498 Vendor Advisory
http://secunia.com/advisories/21745 Vendor Advisory
http://secunia.com/advisories/21983 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
http://www.debian.org/security/2006/dsa-1103
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
http://www.osvdb.org/24639
http://www.redhat.com/support/errata/RHSA-2006-0437.html
http://www.redhat.com/support/errata/RHSA-2006-0493.html
http://www.securityfocus.com/bid/17541
http://www.ubuntu.com/usn/usn-302-1
http://www.vupen.com/english/advisories/2006/1390
http://www.vupen.com/english/advisories/2006/1475
http://www.vupen.com/english/advisories/2006/2554
https://exchange.xforce.ibmcloud.com/vulnerabilities/25869
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9732
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5 - () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5 -
References () http://lwn.net/Alerts/180820/ - () http://lwn.net/Alerts/180820/ -
References () http://secunia.com/advisories/19639 - Vendor Advisory () http://secunia.com/advisories/19639 - Vendor Advisory
References () http://secunia.com/advisories/19735 - Vendor Advisory () http://secunia.com/advisories/19735 - Vendor Advisory
References () http://secunia.com/advisories/20157 - Vendor Advisory () http://secunia.com/advisories/20157 - Vendor Advisory
References () http://secunia.com/advisories/20237 - Vendor Advisory () http://secunia.com/advisories/20237 - Vendor Advisory
References () http://secunia.com/advisories/20398 - () http://secunia.com/advisories/20398 -
References () http://secunia.com/advisories/20716 - Vendor Advisory () http://secunia.com/advisories/20716 - Vendor Advisory
References () http://secunia.com/advisories/20914 - Vendor Advisory () http://secunia.com/advisories/20914 - Vendor Advisory
References () http://secunia.com/advisories/21136 - Vendor Advisory () http://secunia.com/advisories/21136 - Vendor Advisory
References () http://secunia.com/advisories/21179 - Vendor Advisory () http://secunia.com/advisories/21179 - Vendor Advisory
References () http://secunia.com/advisories/21498 - Vendor Advisory () http://secunia.com/advisories/21498 - Vendor Advisory
References () http://secunia.com/advisories/21745 - Vendor Advisory () http://secunia.com/advisories/21745 - Vendor Advisory
References () http://secunia.com/advisories/21983 - Vendor Advisory () http://secunia.com/advisories/21983 - Vendor Advisory
References () http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm -
References () http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm -
References () http://www.debian.org/security/2006/dsa-1103 - () http://www.debian.org/security/2006/dsa-1103 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:086 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:086 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:150 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:150 -
References () http://www.novell.com/linux/security/advisories/2006-05-31.html - () http://www.novell.com/linux/security/advisories/2006-05-31.html -
References () http://www.novell.com/linux/security/advisories/2006_42_kernel.html - () http://www.novell.com/linux/security/advisories/2006_42_kernel.html -
References () http://www.novell.com/linux/security/advisories/2006_47_kernel.html - () http://www.novell.com/linux/security/advisories/2006_47_kernel.html -
References () http://www.osvdb.org/24639 - () http://www.osvdb.org/24639 -
References () http://www.redhat.com/support/errata/RHSA-2006-0437.html - () http://www.redhat.com/support/errata/RHSA-2006-0437.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0493.html - () http://www.redhat.com/support/errata/RHSA-2006-0493.html -
References () http://www.securityfocus.com/bid/17541 - () http://www.securityfocus.com/bid/17541 -
References () http://www.ubuntu.com/usn/usn-302-1 - () http://www.ubuntu.com/usn/usn-302-1 -
References () http://www.vupen.com/english/advisories/2006/1390 - () http://www.vupen.com/english/advisories/2006/1390 -
References () http://www.vupen.com/english/advisories/2006/1475 - () http://www.vupen.com/english/advisories/2006/1475 -
References () http://www.vupen.com/english/advisories/2006/2554 - () http://www.vupen.com/english/advisories/2006/2554 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25869 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25869 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9732 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9732 -

Information

Published : 2006-04-18 10:02

Updated : 2024-11-21 00:07


NVD link : CVE-2006-0744

Mitre link : CVE-2006-0744

CVE.ORG link : CVE-2006-0744


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-20

Improper Input Validation