|
Message-ID: <4D257F9D.8090707@redhat.com> Date: Thu, 06 Jan 2011 16:38:53 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: Greg KH <greg@...ah.com>, "Steven M. Christey" <coley@...us.mitre.org>, Greg KH <gregkh@...e.de> Subject: Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak On 01/06/2011 04:16 AM, Greg KH wrote: > On Wed, Jan 05, 2011 at 12:14:28PM +0800, Eugene Teo wrote: >> In addition to CVE-2010-3881, some versions of the Linux kernel >> forgot to initialize the kvm_vcpu_events.interrupt.pad field before >> being copied to userspace. I have assigned CVE-2010-4525 to this. I >> briefly checked, linux-2.6.33/34.y are affected, linux-2.6/.31/.32.y >> are not. >> >> https://bugzilla.redhat.com/CVE-2010-4525 > > Is there a fix for this in the upstream kernels? How about kernels > greater than .35? The upstream kernel and .35.y onwards are not affected. Thanks, Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.