Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux
kernel 2.6.9, 2.6.18, and probably other versions allows local users to
read uninitialized memory via unknown vectors involving a crafted binary.
Tavis Ormandy discovered that the ia32 emulation under 64bit kernels
did not fully clear uninitialized data. A local attacker could read
private kernel memory, leading to a loss of privacy.
kees> needs http://lkml.org/lkml/diff/2008/6/25/157/1
kees> maybe linux-2.6: 64649a58919e66ec21792dbb6c48cb3da22cbd7f
Updated: 2015-10-17 03:29:30 UTC (commit 10086)