Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 05 Jan 2011 12:14:28 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>, Greg KH <gregkh@...e.de>
Subject: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak

In addition to CVE-2010-3881, some versions of the Linux kernel forgot 
to initialize the kvm_vcpu_events.interrupt.pad field before being 
copied to userspace. I have assigned CVE-2010-4525 to this. I briefly 
checked, linux-2.6.33/34.y are affected, linux-2.6/.31/.32.y are not.

https://bugzilla.redhat.com/CVE-2010-4525

Thanks, Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.