Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux
kernel 2.6.9, 2.6.18, and probably other versions allows local users to
read uninitialized memory via unknown vectors involving a crafted binary.
Tavis Ormandy discovered that the ia32 emulation under 64bit kernels
did not fully clear uninitialized data. A local attacker could read
private kernel memory, leading to a loss of privacy.
kees> needs http://lkml.org/lkml/diff/2008/6/25/157/1
kees> maybe linux-2.6: 64649a58919e66ec21792dbb6c48cb3da22cbd7f
Updated: 2016-03-23 03:30:39 UTC (commit 10817)