Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-3881

Опубликовано: 23 дек. 2010
Источник: debian
EPSS Низкий

Описание

arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.32-29package
linux-2.6not-affectedlennypackage

EPSS

Процентиль: 23%
0.00073
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.

redhat
больше 14 лет назад

arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.

nvd
больше 14 лет назад

arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.

github
около 3 лет назад

arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.

oracle-oval
больше 14 лет назад

ELSA-2010-0998: kvm security and bug fix update (LOW)

EPSS

Процентиль: 23%
0.00073
Низкий