Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-4525

Опубликовано: 11 янв. 2011
Источник: debian
EPSS Низкий

Описание

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.35-1package
linux-2.6not-affectedsqueezepackage
linux-2.6not-affectedlennypackage
linux-2.6not-affectedwheezypackage

EPSS

Процентиль: 30%
0.00108
Низкий

Связанные уязвимости

ubuntu
около 15 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

redhat
около 15 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

nvd
около 15 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

github
больше 3 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

oracle-oval
около 15 лет назад

ELSA-2011-0028: kvm security and bug fix update (LOW)

EPSS

Процентиль: 30%
0.00108
Низкий