4.9

CVE-2006-0744

Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version2.6.0
LinuxLinux Kernel Version2.6.0 Updatetest1
LinuxLinux Kernel Version2.6.0 Updatetest10
LinuxLinux Kernel Version2.6.0 Updatetest11
LinuxLinux Kernel Version2.6.0 Updatetest2
LinuxLinux Kernel Version2.6.0 Updatetest3
LinuxLinux Kernel Version2.6.0 Updatetest4
LinuxLinux Kernel Version2.6.0 Updatetest5
LinuxLinux Kernel Version2.6.0 Updatetest6
LinuxLinux Kernel Version2.6.0 Updatetest7
LinuxLinux Kernel Version2.6.0 Updatetest8
LinuxLinux Kernel Version2.6.0 Updatetest9
LinuxLinux Kernel Version2.6.1
LinuxLinux Kernel Version2.6.1 Updaterc1
LinuxLinux Kernel Version2.6.1 Updaterc2
LinuxLinux Kernel Version2.6.1 Updaterc3
LinuxLinux Kernel Version2.6.2
LinuxLinux Kernel Version2.6.2 Updaterc1
LinuxLinux Kernel Version2.6.2 Updaterc2
LinuxLinux Kernel Version2.6.2 Updaterc3
LinuxLinux Kernel Version2.6.3
LinuxLinux Kernel Version2.6.3 Updaterc1
LinuxLinux Kernel Version2.6.3 Updaterc2
LinuxLinux Kernel Version2.6.3 Updaterc3
LinuxLinux Kernel Version2.6.3 Updaterc4
LinuxLinux Kernel Version2.6.4
LinuxLinux Kernel Version2.6.4 Updaterc1
LinuxLinux Kernel Version2.6.4 Updaterc2
LinuxLinux Kernel Version2.6.4 Updaterc3
LinuxLinux Kernel Version2.6.5
LinuxLinux Kernel Version2.6.5 Updaterc1
LinuxLinux Kernel Version2.6.5 Updaterc2
LinuxLinux Kernel Version2.6.5 Updaterc3
LinuxLinux Kernel Version2.6.6
LinuxLinux Kernel Version2.6.6 Updaterc1
LinuxLinux Kernel Version2.6.6 Updaterc2
LinuxLinux Kernel Version2.6.6 Updaterc3
LinuxLinux Kernel Version2.6.7
LinuxLinux Kernel Version2.6.7 Updaterc1
LinuxLinux Kernel Version2.6.7 Updaterc2
LinuxLinux Kernel Version2.6.7 Updaterc3
LinuxLinux Kernel Version2.6.8
LinuxLinux Kernel Version2.6.8 Updaterc1
LinuxLinux Kernel Version2.6.8 Updaterc2
LinuxLinux Kernel Version2.6.8 Updaterc3
LinuxLinux Kernel Version2.6.8 Updaterc4
LinuxLinux Kernel Version2.6.9
LinuxLinux Kernel Version2.6.9 Update2.6.20
LinuxLinux Kernel Version2.6.9 Updaterc1
LinuxLinux Kernel Version2.6.9 Updaterc2
LinuxLinux Kernel Version2.6.9 Updaterc3
LinuxLinux Kernel Version2.6.9 Updaterc4
LinuxLinux Kernel Version2.6.10
LinuxLinux Kernel Version2.6.10 Updaterc1
LinuxLinux Kernel Version2.6.10 Updaterc2
LinuxLinux Kernel Version2.6.10 Updaterc3
LinuxLinux Kernel Version2.6.11
LinuxLinux Kernel Version2.6.11 Updaterc1
LinuxLinux Kernel Version2.6.11 Updaterc2
LinuxLinux Kernel Version2.6.11 Updaterc3
LinuxLinux Kernel Version2.6.11 Updaterc4
LinuxLinux Kernel Version2.6.11 Updaterc5
LinuxLinux Kernel Version2.6.11.1
LinuxLinux Kernel Version2.6.11.2
LinuxLinux Kernel Version2.6.11.3
LinuxLinux Kernel Version2.6.11.4
LinuxLinux Kernel Version2.6.11.5
LinuxLinux Kernel Version2.6.11.6
LinuxLinux Kernel Version2.6.11.7
LinuxLinux Kernel Version2.6.11.8
LinuxLinux Kernel Version2.6.11.9
LinuxLinux Kernel Version2.6.11.10
LinuxLinux Kernel Version2.6.11.11
LinuxLinux Kernel Version2.6.11.12
LinuxLinux Kernel Version2.6.12 Updaterc1
LinuxLinux Kernel Version2.6.12 Updaterc2
LinuxLinux Kernel Version2.6.12 Updaterc3
LinuxLinux Kernel Version2.6.12 Updaterc4
LinuxLinux Kernel Version2.6.12 Updaterc5
LinuxLinux Kernel Version2.6.12 Updaterc6
LinuxLinux Kernel Version2.6.12.1
LinuxLinux Kernel Version2.6.12.2
LinuxLinux Kernel Version2.6.12.3
LinuxLinux Kernel Version2.6.12.4
LinuxLinux Kernel Version2.6.12.5
LinuxLinux Kernel Version2.6.12.6
LinuxLinux Kernel Version2.6.13
LinuxLinux Kernel Version2.6.13 Updaterc1
LinuxLinux Kernel Version2.6.13 Updaterc2
LinuxLinux Kernel Version2.6.13 Updaterc3
LinuxLinux Kernel Version2.6.13 Updaterc4
LinuxLinux Kernel Version2.6.13 Updaterc5
LinuxLinux Kernel Version2.6.13 Updaterc6
LinuxLinux Kernel Version2.6.13 Updaterc7
LinuxLinux Kernel Version2.6.13.1
LinuxLinux Kernel Version2.6.13.2
LinuxLinux Kernel Version2.6.13.3
LinuxLinux Kernel Version2.6.13.4
LinuxLinux Kernel Version2.6.14
LinuxLinux Kernel Version2.6.14 Updaterc1
LinuxLinux Kernel Version2.6.14 Updaterc2
LinuxLinux Kernel Version2.6.14 Updaterc3
LinuxLinux Kernel Version2.6.14 Updaterc4
LinuxLinux Kernel Version2.6.14 Updaterc5
LinuxLinux Kernel Version2.6.14.1
LinuxLinux Kernel Version2.6.14.2
LinuxLinux Kernel Version2.6.14.3
LinuxLinux Kernel Version2.6.14.4
LinuxLinux Kernel Version2.6.14.5
LinuxLinux Kernel Version2.6.14.6
LinuxLinux Kernel Version2.6.14.7
LinuxLinux Kernel Version2.6.15
LinuxLinux Kernel Version2.6.15 Updaterc1
LinuxLinux Kernel Version2.6.15 Updaterc3
LinuxLinux Kernel Version2.6.15 Updaterc4
LinuxLinux Kernel Version2.6.15 Updaterc5
LinuxLinux Kernel Version2.6.15 Updaterc6
LinuxLinux Kernel Version2.6.15 Updaterc7
LinuxLinux Kernel Version2.6.15.1
LinuxLinux Kernel Version2.6.15.2
LinuxLinux Kernel Version2.6.15.3
LinuxLinux Kernel Version2.6.15.4
LinuxLinux Kernel Version2.6.15.5
LinuxLinux Kernel Version2.6.15.6
LinuxLinux Kernel Version2.6.15.7
LinuxLinux Kernel Version2.6.16
LinuxLinux Kernel Version2.6.16 Updaterc1
LinuxLinux Kernel Version2.6.16 Updaterc2
LinuxLinux Kernel Version2.6.16 Updaterc3
LinuxLinux Kernel Version2.6.16 Updaterc4
LinuxLinux Kernel Version2.6.16 Updaterc5
LinuxLinux Kernel Version2.6.16 Updaterc6
LinuxLinux Kernel Version2.6.16.1
LinuxLinux Kernel Version2.6.16.2
LinuxLinux Kernel Version2.6.16.3
LinuxLinux Kernel Version2.6.16.4
LinuxLinux Kernel Version2.6.16_rc7
LinuxLinux Kernel Version2.6_test9_cvs
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.11% 0.256
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.9 3.9 6.9
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.