Description
The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources.
CVSS Metrics
- Vector
- AV:L/AC:L/Au:N/C:P/I:N/A:N
- Access Vector
- local
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- partial
- Integrity
- none
- Availability
- none
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- MANDRAKESOFT
- Published
- 8/6/2004
- Last Modified
- 4/3/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
mandrakesoft : mandrake_multi_network_firewallsuse : suse_email_serversuse : suse_email_serversuse : suse_linux_admin-cd_for_firewallsuse : suse_linux_connectivity_serversuse : suse_linux_database_serversuse : suse_linux_firewall_cdsuse : suse_linux_firewall_live-cdsuse : suse_linux_office_serversuse : suse_office_serverconectiva : linuxconectiva : linuxengardelinux : secure_communityengardelinux : secure_linuxgentoo : linuxlinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernelmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linux_corporate_servermandrakesoft : mandrake_linux_corporate_serversuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linuxsuse : suse_linux
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.