Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-4525

Опубликовано: 05 янв. 2011
Источник: redhat
CVSS2: 1.9
EPSS Низкий

Описание

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kvmAffected
Red Hat Enterprise Linux 5kvmFixedRHSA-2011:002813.01.2011
Red Hat Enterprise Linux 6kernelFixedRHSA-2011:000711.01.2011

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=665470kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak

EPSS

Процентиль: 30%
0.00108
Низкий

1.9 Low

CVSS2

Связанные уязвимости

ubuntu
больше 14 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

nvd
больше 14 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

debian
больше 14 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_even ...

github
около 3 лет назад

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

oracle-oval
больше 14 лет назад

ELSA-2011-0028: kvm security and bug fix update (LOW)

EPSS

Процентиль: 30%
0.00108
Низкий

1.9 Low

CVSS2