CVE-2010-4525

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.

References

http://osvdb.org/70377

http://secunia.com/advisories/42890

http://www.openwall.com/lists/oss-security/2011/01/05/1

http://www.openwall.com/lists/oss-security/2011/01/05/9

http://www.openwall.com/lists/oss-security/2011/01/06/3

http://www.redhat.com/support/errata/RHSA-2011-0007.html

http://www.redhat.com/support/errata/RHSA-2011-0028.html

http://www.securityfocus.com/bid/45676

http://www.vupen.com/english/advisories/2011/0123

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525

https://exchange.xforce.ibmcloud.com/vulnerabilities/64519

Details

Source: MITRE

Published: 2011-01-11

Updated: 2017-08-17

Type: CWE-200

Risk Information

CVSS v2

Base Score: 1.9

Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.4

Severity: LOW

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
75554openSUSE Security Update : kernel (openSUSE-SU-2011:0399-1)NessusSuSE Local Security Checks
high
68177Oracle Linux 6 : kernel (ELSA-2011-0007)NessusOracle Linux Local Security Checks
high
63968RHEL 5 : kvm (RHSA-2011:0028)NessusRed Hat Local Security Checks
low
60934Scientific Linux Security Update : kvm on SL5.x x86_64NessusScientific Linux Local Security Checks
low
51500RHEL 6 : kernel (RHSA-2011:0007)NessusRed Hat Local Security Checks
high