Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-4525

Опубликовано: 05 янв. 2011
Источник: redhat
CVSS2: 1.9

Описание

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kvmAffected
Red Hat Enterprise Linux 5kvmFixedRHSA-2011:002813.01.2011
Red Hat Enterprise Linux 6kernelFixedRHSA-2011:000711.01.2011

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=665470kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak

1.9 Low

CVSS2

Связанные уязвимости

ubuntu
почти 15 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

nvd
почти 15 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

debian
почти 15 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_even ...

github
больше 3 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

oracle-oval
почти 15 лет назад

ELSA-2011-0028: kvm security and bug fix update (LOW)

1.9 Low

CVSS2