Upstream information
Description
Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 4.9 |
Vector | AV:L/AC:L/Au:N/C:C/I:N/A:N |
Access Vector | Local |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | None |
Availability Impact | None |
Note from the SUSE Security Team on the kernel-default package
SUSE will no longer fix all CVEs in the Linux Kernel anymore, but declare some bug classes as won't fix. Please refer to TID 21496 for more details. SUSE Bugzilla entries: 363921 [CLOSED / FIXED], 400491 [RESOLVED / DUPLICATE]SUSE Security Advisories:
- SUSE-SA:2008:047, published Wed, 01 Oct 2008 13:00:00 +0000
- SUSE-SA:2008:048, published Wed, 01 Oct 2008 15:00:00 +0000
- SUSE-SA:2008:049, published Thu, 02 Oct 2008 10:00:00 +0000
- SUSE-SA:2010:036, published Wed, 01 Sep 2010 11:00:00 +0000
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 02:46:00 2013CVE page last modified: Mon Mar 17 16:14:43 2025