Описание
Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of the DEBUG_STACK stack during the do_debug function call.
Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of the DEBUG_STACK stack during the do_debug function call.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-1066
- https://usn.ubuntu.com/281-1
- http://marc.info/?l=linux-kernel&m=113932292516359&w=2
- http://secunia.com/advisories/19374
- http://secunia.com/advisories/19955
- http://secunia.com/advisories/21614
- http://www.debian.org/security/2006/dsa-1017
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
- http://www.osvdb.org/24098
- http://www.securityfocus.com/bid/17216
EPSS
CVE ID
Связанные уязвимости
Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of the DEBUG_STACK stack during the do_debug function call.
Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of the DEBUG_STACK stack during the do_debug function call.
Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems wi ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS