First published: Tue Oct 17 2006(Updated: )
Linux kernel does not properly save or restore EFLAGS during a context switch, or reset the flags when creating new threads, which allows local users to cause a denial of service (process crash), as demonstrated using a process that sets the Alignment Check flag (EFLAGS 0x40000), which triggers a SIGBUS in other processes that have an unaligned access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.4.0<=2.6.19 | |
Ubuntu Linux | =5.10 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =6.10 | |
Linux kernel | >=2.4.0<=2.6.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5173 has a severity rating of medium, as it can lead to a denial of service through process crashes.
To fix CVE-2006-5173, upgrade your Linux kernel to a version that is newer than 2.6.19.
CVE-2006-5173 affects several distributions including older versions of Ubuntu such as 5.10, 6.06, and 6.10.
CVE-2006-5173 can be exploited by local users to crash processes by manipulating the EFLAGS register.
CVE-2006-5173 cannot be exploited remotely; it requires local access to the affected system.