Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 524550 - (CVE-2009-2707) CVE-2009-2707 ia32el: unspecified vulnerability in ia32el
CVE-2009-2707 ia32el: unspecified vulnerability in ia32el
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
http://web.nvd.nist.gov/view/vuln/det...
reported=20090921,public=20090918,sou...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2009-09-21 03:26 EDT by Eugene Teo (Security Response)
Modified: 2010-06-11 14:08 EDT (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2009-09-23 06:29:16 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Eugene Teo (Security Response) 2009-09-21 03:26:29 EDT
Description of problem:
Unspecified vulnerability in ia32el (aka the IA 32 emulation functionality) before 7042_7022-0.4.2 in SUSE Linux Enterprise (SLE) 10 SP2 on Itanium IA64 machines allows local users to cause a denial of service (system crash) via a 32-bit x86 application.

URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2707
Reference: MISC:https://bugs.launchpad.net/bugs/cve/2009-2707
Reference: CONFIRM:http://support.novell.com/security/cve/CVE-2009-2707.html
Reference: CONFIRM:https://bugzilla.novell.com/show_bug.cgi?id=521524
Reference: SUSE:SUSE-SR:2009:015
Reference: URL:http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
Reference: BID:36393
Reference: URL:http://www.securityfocus.com/bid/36393
Comment 14 Tomas Hoger 2009-09-23 06:29:16 EDT
Not vulnerable. This issue did not affect the versions of ia32el as shipped with Red Hat Enterprise Linux 3, 4 or 5.

Note You need to log in before you can comment on or make changes to this bug.