Upstream information
Description
Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 1.9 |
Vector | AV:L/AC:M/Au:N/C:P/I:N/A:N |
Access Vector | Local |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
SUSE Security Advisories:
- SUSE-SA:2011:020, published Thu, 28 Apr 2011 11:00:00 +0000 openSUSE-SU-2011:0399-1
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Linux Enterprise Real Time 11 SP1 |
| Patchnames: slertesp1-kernel |
SUSE Timeline for this CVE
CVE page created: Tue Jul 9 18:01:33 2013CVE page last modified: Fri Dec 8 16:45:32 2023