CVE-2006-1056

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys. NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processors in a security-relevant fashion that was not addressed by the kernels.

References

ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc

http://kb.vmware.com/kb/2533126

http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.9

http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html

http://lwn.net/Alerts/180820/

http://marc.info/?l=linux-kernel&m=114548768214478&w=2

http://secunia.com/advisories/19715

http://secunia.com/advisories/19724

http://secunia.com/advisories/19735

http://secunia.com/advisories/20398

http://secunia.com/advisories/20671

http://secunia.com/advisories/20716

http://secunia.com/advisories/20914

http://secunia.com/advisories/21035

http://secunia.com/advisories/21136

http://secunia.com/advisories/21465

http://secunia.com/advisories/21983

http://secunia.com/advisories/22417

http://secunia.com/advisories/22875

http://secunia.com/advisories/22876

http://security.freebsd.org/advisories/FreeBSD-SA-06:14-amd.txt

http://securitytracker.com/id?1015966

http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm

http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm

http://www.debian.org/security/2006/dsa-1097

http://www.debian.org/security/2006/dsa-1103

http://www.novell.com/linux/security/advisories/2006-05-31.html

http://www.osvdb.org/24746

http://www.osvdb.org/24807

http://www.redhat.com/support/errata/RHSA-2006-0437.html

http://www.redhat.com/support/errata/RHSA-2006-0575.html

http://www.redhat.com/support/errata/RHSA-2006-0579.html

http://www.securityfocus.com/archive/1/431341

http://www.securityfocus.com/archive/1/451404/100/0/threaded

http://www.securityfocus.com/archive/1/451417/100/200/threaded

http://www.securityfocus.com/archive/1/451419/100/200/threaded

http://www.securityfocus.com/archive/1/451421/100/0/threaded

http://www.securityfocus.com/bid/17600

http://www.ubuntu.com/usn/usn-302-1

http://www.vmware.com/download/esx/esx-213-200610-patch.html

http://www.vmware.com/download/esx/esx-254-200610-patch.html

http://www.vupen.com/english/advisories/2006/1426

http://www.vupen.com/english/advisories/2006/1475

http://www.vupen.com/english/advisories/2006/2554

http://www.vupen.com/english/advisories/2006/4353

http://www.vupen.com/english/advisories/2006/4502

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187910

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187911

https://exchange.xforce.ibmcloud.com/vulnerabilities/25871

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9995

Details

Source: MITRE

Published: 2006-04-20

Updated: 2018-10-30

Type: CWE-310

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 2.6.16.8 (inclusive)

cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
84140OracleVM 3.2 : xen (OVMSA-2015-0068) (POODLE) (Venom)NessusOracleVM Local Security Checks
low
83616SUSE SLES11 Security Update : Xen (SUSE-SU-2014:0446-1)NessusSuSE Local Security Checks
high
79511OracleVM 3.1 : xen (OVMSA-2013-0043)NessusOracleVM Local Security Checks
medium
79510OracleVM 3.2 : xen (OVMSA-2013-0042)NessusOracleVM Local Security Checks
medium
27877Ubuntu 5.04 / 5.10 / 6.06 LTS : linux-source-2.6.10/2.6.12/2.6.15 vulnerabilities (USN-302-1)NessusUbuntu Local Security Checks
high
22645Debian DSA-1103-1 : kernel-source-2.6.8 - several vulnerabilitiesNessusDebian Local Security Checks
critical
22639Debian DSA-1097-1 : kernel-source-2.4.27 - several vulnerabilitiesNessusDebian Local Security Checks
critical
22276CentOS 4 : kernel (CESA-2006:0575)NessusCentOS Local Security Checks
high
22221RHEL 4 : kernel (RHSA-2006:0575)NessusRed Hat Local Security Checks
high
22135CentOS 3 : kernel (CESA-2006:0437)NessusCentOS Local Security Checks
high
22086RHEL 3 : kernel (RHSA-2006:0437)NessusRed Hat Local Security Checks
high
22054RHEL 2.1 : kernel (RHSA-2006:0579)NessusRed Hat Local Security Checks
medium
21253Fedora Core 4 : kernel-2.6.16-1.2096_FC4 (2006-423)NessusFedora Local Security Checks
medium
801420CentOS RHSA-2006-0575 Security CheckLog Correlation EngineGeneric
high
801417CentOS RHSA-2006-0437 Security CheckLog Correlation EngineGeneric
high