CVE-2010-4525
Publication date 11 January 2011
Last updated 24 July 2024
Ubuntu priority
Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.
From the Ubuntu Security Team
Jan Kiszka discovered that KVM did not correctly initialize memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
linux-ti-omap4 | ||
Patch details
Package | Patch details |
---|---|
linux |