Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-4525

Опубликовано: 11 янв. 2011
Источник: debian
EPSS Низкий

Описание

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.35-1package
linux-2.6not-affectedsqueezepackage
linux-2.6not-affectedlennypackage
linux-2.6not-affectedwheezypackage

EPSS

Процентиль: 30%
0.00108
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

redhat
больше 14 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

nvd
больше 14 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

github
около 3 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

oracle-oval
больше 14 лет назад

ELSA-2011-0028: kvm security and bug fix update (LOW)

EPSS

Процентиль: 30%
0.00108
Низкий