CVE-2009-2910

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.

References

http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git;a=commit;h=24e35800cdc4350fc34e2bed37b608a9e13ab3b6

http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html

http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html

http://lkml.org/lkml/2009/10/1/164

http://marc.info/?l=oss-security&m=125442304214452&w=2

http://marc.info/?l=oss-security&m=125444390112831&w=2

http://marc.info/?l=oss-security&m=125511635004768&w=2

http://secunia.com/advisories/36927

http://secunia.com/advisories/37075

http://secunia.com/advisories/37351

http://support.avaya.com/css/P8/documents/100073666

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4

http://www.openwall.com/lists/oss-security/2009/10/02/1

http://www.redhat.com/support/errata/RHSA-2009-1671.html

http://www.securityfocus.com/bid/36576

http://www.ubuntu.com/usn/usn-864-1

https://bugzilla.redhat.com/show_bug.cgi?id=526788

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359

https://rhn.redhat.com/errata/RHSA-2009-1540.html

https://rhn.redhat.com/errata/RHSA-2010-0046.html

https://rhn.redhat.com/errata/RHSA-2010-0095.html

https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html

Details

Source: MITRE

Published: 2009-10-20

Updated: 2020-08-07

Type: CWE-200

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

Tenable Plugins

View all (32 total)

IDNameProductFamilySeverity
89740VMware ESX / ESXi Third-Party Libraries and Components (VMSA-2010-0009) (remote check)NessusVMware ESX Local Security Checks
critical
67988Oracle Linux 5 : kernel (ELSA-2010-0046)NessusOracle Linux Local Security Checks
high
67973Oracle Linux 4 : kernel (ELSA-2009-1671)NessusOracle Linux Local Security Checks
high
67955Oracle Linux 3 : kernel (ELSA-2009-1550)NessusOracle Linux Local Security Checks
high
67953Oracle Linux 5 : kernel (ELSA-2009-1548)NessusOracle Linux Local Security Checks
high
67952Oracle Linux 4 : kernel (ELSA-2009-1541)NessusOracle Linux Local Security Checks
high
67070CentOS 3 : kernel (CESA-2009:1550)NessusCentOS Local Security Checks
high
67068CentOS 5 : kernel (CESA-2009:1548)NessusCentOS Local Security Checks
high
67067CentOS 4 : kernel (CESA-2009:1541)NessusCentOS Local Security Checks
high
60705Scientific Linux Security Update : kernel on SL4.x i386/x86_64NessusScientific Linux Local Security Checks
high
59140SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 6636)NessusSuSE Local Security Checks
high
46765VMSA-2010-0009 : ESXi ntp and ESX Service Console third-party updatesNessusVMware ESX Local Security Checks
high
44793Debian DSA-1928-1 : linux-2.6.24 - privilege escalation/denial of service/sensitive memory leakNessusDebian Local Security Checks
high
44780Debian DSA-1915-1 : linux-2.6 - privilege escalation/denial of service/sensitive memory leakNessusDebian Local Security Checks
high
44621openSUSE Security Update : kernel (kernel-1908)NessusSuSE Local Security Checks
critical
44096CentOS 5 : kernel (CESA-2010:0046)NessusCentOS Local Security Checks
high
44062RHEL 5 : kernel (RHSA-2010:0046)NessusRed Hat Local Security Checks
high
43354CentOS 4 : kernel (CESA-2009:1671)NessusCentOS Local Security Checks
high
43169RHEL 4 : kernel (RHSA-2009:1671)NessusRed Hat Local Security Checks
high
43026Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : linux, linux-source-2.6.15 vulnerabilities (USN-864-1)NessusUbuntu Local Security Checks
high
42990SuSE 11 Security Update : Linux kernel (SAT Patch Numbers 1581 / 1588 / 1591)NessusSuSE Local Security Checks
high
42952openSUSE Security Update : kernel (kernel-1593)NessusSuSE Local Security Checks
high
42812SuSE9 Security Update : Linux kernel (YOU Patch Number 12541)NessusSuSE Local Security Checks
high
42465SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 6632)NessusSuSE Local Security Checks
high
42360RHEL 3 : kernel (RHSA-2009:1550)NessusRed Hat Local Security Checks
high
42358RHEL 5 : kernel (RHSA-2009:1548)NessusRed Hat Local Security Checks
high
42357RHEL 4 : kernel (RHSA-2009:1541)NessusRed Hat Local Security Checks
high
42343SuSE 11 Security Update : Linux kernel (SAT Patch Numbers 1410 / 1412 / 1413)NessusSuSE Local Security Checks
medium
42334openSUSE Security Update : kernel (kernel-1415)NessusSuSE Local Security Checks
medium
42271Fedora 11 : kernel-2.6.30.9-90.fc11 (2009-10639)NessusFedora Local Security Checks
high
42156Fedora 10 : kernel-2.6.27.37-170.2.104.fc10 (2009-10525)NessusFedora Local Security Checks
medium
801485CentOS RHSA-2010-0046 Security CheckLog Correlation EngineGeneric
high