First published: Sun Dec 31 2006(Updated: )
Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <=2.6.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5755 has been classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2006-5755, upgrade the Linux kernel to version 2.6.18 or later.
CVE-2006-5755 affects local users on x86_64 systems running Linux kernel versions prior to 2.6.18.
Exploiting CVE-2006-5755 can lead to a system crash due to improper handling of the EFLAGS during context switches.
There are no known workarounds for CVE-2006-5755; updating the kernel is the recommended action.