Red Hat Enterprise Virtualization Hypervisor VDM Information Disclosure Vulnerability

No specific exploit is required. An attacker would only need local interactive access to the guest operating system.


 

Privacy Statement
Copyright 2010, SecurityFocus