Vulnerability Name:
CVE-2010-4525 (CCN-64519)
Assigned:
2010-12-09
Published:
2011-01-05
Updated:
2017-08-17
Summary:
Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.
CVSS v3 Severity:
4.0 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
None
Availibility (A):
None
CVSS v2 Severity:
1.9 Low
(CVSS v2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
)
1.4 Low
(Temporal CVSS v2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
None
Availibility (A):
None
2.1 Low
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
)
1.6 Low
(CCN Temporal CVSS v2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
None
Availibility (A):
None
1.9 Low
(REDHAT CVSS v2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
)
1.4 Low
(REDHAT Temporal CVSS v2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
None
Availibility (A):
None
Vulnerability Type:
CWE-200
Vulnerability Consequences:
Obtain Information
References:
Source: CCN
Type: oss-security: Eugene Teo | 5 Jan 05:14
CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak
Source: MITRE
Type: CNA
CVE-2010-4525
Source: OSVDB
Type: UNKNOWN
70377
Source: CCN
Type: RHSA-2011-0007
Important: kernel security and bug fix update
Source: CCN
Type: RHSA-2011-0028
Low: kvm security and bug fix update
Source: SECUNIA
Type: UNKNOWN
42890
Source: CCN
Type: The Linux Kernel Archives Web site
The Linux Kernel Archives
Source: MLIST
Type: UNKNOWN
[oss-security] 20110105 CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak
Source: MLIST
Type: UNKNOWN
[oss-security] 20110105 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak
Source: MLIST
Type: UNKNOWN
[oss-security] 20110106 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak
Source: CCN
Type: OSVDB ID: 70377
Linux Kernel kvm_vcpu_events.interrupt.pad Structure Member Stack Memory Local Disclosure
Source: REDHAT
Type: UNKNOWN
RHSA-2011:0007
Source: REDHAT
Type: UNKNOWN
RHSA-2011:0028
Source: BID
Type: UNKNOWN
45676
Source: CCN
Type: BID-45676
Linux Kernel 'kvm_vcpu_events.interrupt.pad' Field Local Information Disclosure Vulnerability
Source: VUPEN
Type: UNKNOWN
ADV-2011-0123
Source: MISC
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525
Source: XF
Type: UNKNOWN
kernel-kvmvcpueventsinterrupt-info-disc(64519)
Source: XF
Type: UNKNOWN
kernel-kvmvcpueventsinterrupt-info-disc(64519)
Source: SUSE
Type: SUSE-SA:2011:020
Linux kernel security update
Vulnerable Configuration:
Configuration 1
:
cpe:/o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*
Configuration RedHat 1
:
cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
Configuration RedHat 2
:
cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*
Configuration RedHat 3
:
cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*
Configuration RedHat 4
:
cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
Configuration RedHat 5
:
cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*
Configuration RedHat 6
:
cpe:/a:redhat:rhel_virtualization:5:*:*:*:*:*:*:*
Configuration RedHat 7
:
cpe:/a:redhat:rhel_virtualization:5::client:*:*:*:*:*
Configuration RedHat 8
:
cpe:/a:redhat:rhel_virtualization:5::server:*:*:*:*:*
Configuration CCN 1
:
cpe:/o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*
AND
cpe:/a:redhat:rhel_virtualization:5:*:server:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.opensuse.security:def:20104525
V
CVE-2010-4525
2021-06-25
oval:org.mitre.oval:def:23178
P
ELSA-2011:0028: kvm security and bug fix update (Low)
2014-05-26
oval:org.mitre.oval:def:23550
P
ELSA-2011:0007: kernel security and bug fix update (Important)
2014-05-26
oval:org.mitre.oval:def:21679
P
RHSA-2011:0028: kvm security and bug fix update (Low)
2014-02-24
oval:org.mitre.oval:def:21719
P
RHSA-2011:0007: kernel security and bug fix update (Important)
2014-02-24
oval:com.redhat.rhsa:def:20110028
P
RHSA-2011:0028: kvm security and bug fix update (Low)
2011-01-13
oval:com.redhat.rhsa:def:20110007
P
RHSA-2011:0007: kernel security and bug fix update (Important)
2011-01-11
BACK
linux
linux kernel 2.6.33
linux
linux kernel 2.6.34
linux
linux kernel 2.6.33
linux
linux kernel 2.6.33 rc1
linux
linux kernel 2.6.33 rc2
linux
linux kernel 2.6.33 rc3
linux
linux kernel 2.6.33 rc4
linux
linux kernel 2.6.33 rc5
linux
linux kernel 2.6.33 rc6
linux
linux kernel 2.6.33 rc7
linux
linux kernel 2.6.33.1
linux
linux kernel 2.6.34 rc1
linux
linux kernel 2.6.33 rc8
linux
linux kernel 2.6.33.2
linux
linux kernel 2.6.34 rc2
linux
linux kernel 2.6.34 rc3
linux
linux kernel 2.6.34 rc4
linux
linux kernel 2.6.34
linux
linux kernel 2.6.34 rc5
linux
linux kernel 2.6.33.3
linux
linux kernel 2.6.33.4
linux
linux kernel 2.6.33.5
linux
linux kernel 2.6.33.6
linux
linux kernel 2.6.33.7
redhat
rhel virtualization 5
redhat
enterprise linux 6
redhat
enterprise linux 6
redhat
enterprise linux desktop 6
redhat
enterprise linux hpc node 6