Upstream information
Description
The azx_position_ok function in hda_intel.c in Linux kernel 2.6.33-rc4 and earlier, when running on the AMD780V chip set, allows context-dependent attackers to cause a denial of service (crash) via unknown manipulations that trigger a divide-by-zero error.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
| CVSS detail | National Vulnerability Database |
|---|---|
| Base Score | 7.1 |
| Vector | AV:N/AC:M/Au:N/C:N/I:N/A:C |
| Access Vector | Network |
| Access Complexity | Medium |
| Authentication | None |
| Confidentiality Impact | None |
| Integrity Impact | None |
| Availability Impact | Complete |
Note from the SUSE Security Team
This problem does not affect products earlier than SUSE Linux Enterprise 11 as the affected code was only introduced later. So SUSE Linux Enterprise 9 and 10 are not affected. SUSE Bugzilla entry: 581718 [RESOLVED / FIXED] No SUSE Security Announcements cross referenced.SUSE Timeline for this CVE
CVE page created: Fri Jun 28 04:04:59 2013CVE page last modified: Mon Oct 6 18:16:13 2025