Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5 - | |
References | () http://lwn.net/Alerts/180820/ - | |
References | () http://secunia.com/advisories/19639 - Vendor Advisory | |
References | () http://secunia.com/advisories/19735 - Vendor Advisory | |
References | () http://secunia.com/advisories/20157 - Vendor Advisory | |
References | () http://secunia.com/advisories/20237 - Vendor Advisory | |
References | () http://secunia.com/advisories/20398 - | |
References | () http://secunia.com/advisories/20716 - Vendor Advisory | |
References | () http://secunia.com/advisories/20914 - Vendor Advisory | |
References | () http://secunia.com/advisories/21136 - Vendor Advisory | |
References | () http://secunia.com/advisories/21179 - Vendor Advisory | |
References | () http://secunia.com/advisories/21498 - Vendor Advisory | |
References | () http://secunia.com/advisories/21745 - Vendor Advisory | |
References | () http://secunia.com/advisories/21983 - Vendor Advisory | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm - | |
References | () http://www.debian.org/security/2006/dsa-1103 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:086 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:150 - | |
References | () http://www.novell.com/linux/security/advisories/2006-05-31.html - | |
References | () http://www.novell.com/linux/security/advisories/2006_42_kernel.html - | |
References | () http://www.novell.com/linux/security/advisories/2006_47_kernel.html - | |
References | () http://www.osvdb.org/24639 - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0437.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0493.html - | |
References | () http://www.securityfocus.com/bid/17541 - | |
References | () http://www.ubuntu.com/usn/usn-302-1 - | |
References | () http://www.vupen.com/english/advisories/2006/1390 - | |
References | () http://www.vupen.com/english/advisories/2006/1475 - | |
References | () http://www.vupen.com/english/advisories/2006/2554 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25869 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9732 - |
Information
Published : 2006-04-18 10:02
Updated : 2024-11-21 00:07
NVD link : CVE-2006-0744
Mitre link : CVE-2006-0744
CVE.ORG link : CVE-2006-0744
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-20
Improper Input Validation