Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-3881

Опубликовано: 30 окт. 2010
Источник: redhat
CVSS2: 1.9
EPSS Низкий

Описание

arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.

Отчет

This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG as they did not include support for Kernel-based Virtual Machine (KVM). A future kernel update in Red Hat Enterprise Linux 5 may address this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelAffected
Red Hat Enterprise Linux 5kvmFixedRHSA-2010:099820.12.2010
Red Hat Enterprise Linux 6kernelFixedRHSA-2011:054219.05.2011
Red Hat Enterprise Linux 6.0 EUS - Server OnlykernelFixedRHSA-2011:088321.06.2011

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=649920kvm: arch/x86/kvm/x86.c: reading uninitialized stack memory

EPSS

Процентиль: 23%
0.00073
Низкий

1.9 Low

CVSS2

Связанные уязвимости

ubuntu
больше 14 лет назад

arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.

nvd
больше 14 лет назад

arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.

debian
больше 14 лет назад

arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initia ...

github
около 3 лет назад

arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.

oracle-oval
больше 14 лет назад

ELSA-2010-0998: kvm security and bug fix update (LOW)

EPSS

Процентиль: 23%
0.00073
Низкий

1.9 Low

CVSS2

Уязвимость CVE-2010-3881