Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/64519 | vdb entry |
http://www.openwall.com/lists/oss-security/2011/01/05/9 | mailing list |
http://www.redhat.com/support/errata/RHSA-2011-0007.html | vendor advisory |
http://osvdb.org/70377 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2011-0028.html | vendor advisory |
http://www.securityfocus.com/bid/45676 | vdb entry |
http://www.openwall.com/lists/oss-security/2011/01/05/1 | mailing list |
http://www.openwall.com/lists/oss-security/2011/01/06/3 | mailing list |
http://secunia.com/advisories/42890 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525 | |
http://www.vupen.com/english/advisories/2011/0123 | vdb entry |