{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2006-0744","title":"Title"},{"category":"description","text":"Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2006-0744","url":"https://www.suse.com/security/cve/CVE-2006-0744"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 156580 for CVE-2006-0744","url":"https://bugzilla.suse.com/156580"},{"category":"external","summary":"Advisory link for SUSE-SA:2006:028","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NHYECM4VBKXEW3VB3CVU4VPMJPBVV6X6/#NHYECM4VBKXEW3VB3CVU4VPMJPBVV6X6"},{"category":"external","summary":"Advisory link for SUSE-SA:2006:042","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YUUWKSH6QWMEE34DU5XHDA542UWYWKYI/#YUUWKSH6QWMEE34DU5XHDA542UWYWKYI"},{"category":"external","summary":"Advisory link for SUSE-SA:2006:047","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XOOHJY2QIXDZDAFHFEJ5MIPWXSQDB32/#5XOOHJY2QIXDZDAFHFEJ5MIPWXSQDB32"}],"title":"SUSE CVE CVE-2006-0744","tracking":{"current_release_date":"2023-12-09T03:42:52Z","generator":{"date":"2023-02-15T06:16:09Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2006-0744","initial_release_date":"2023-02-15T06:16:09Z","revision_history":[{"date":"2023-02-15T06:16:09Z","number":"2","summary":"Current version"},{"date":"2023-12-08T05:21:07Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:42:52Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}}}