Vulnerability Name:

CVE-2010-4525 (CCN-64519)

Assigned:2010-12-09
Published:2011-01-05
Updated:2017-08-17
Summary:Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:1.9 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N)
1.4 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
1.9 Low (REDHAT CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N)
1.4 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: oss-security: Eugene Teo | 5 Jan 05:14
CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak

Source: MITRE
Type: CNA
CVE-2010-4525

Source: OSVDB
Type: UNKNOWN
70377

Source: CCN
Type: RHSA-2011-0007
Important: kernel security and bug fix update

Source: CCN
Type: RHSA-2011-0028
Low: kvm security and bug fix update

Source: SECUNIA
Type: UNKNOWN
42890

Source: CCN
Type: The Linux Kernel Archives Web site
The Linux Kernel Archives

Source: MLIST
Type: UNKNOWN
[oss-security] 20110105 CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak

Source: MLIST
Type: UNKNOWN
[oss-security] 20110105 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak

Source: MLIST
Type: UNKNOWN
[oss-security] 20110106 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak

Source: CCN
Type: OSVDB ID: 70377
Linux Kernel kvm_vcpu_events.interrupt.pad Structure Member Stack Memory Local Disclosure

Source: REDHAT
Type: UNKNOWN
RHSA-2011:0007

Source: REDHAT
Type: UNKNOWN
RHSA-2011:0028

Source: BID
Type: UNKNOWN
45676

Source: CCN
Type: BID-45676
Linux Kernel 'kvm_vcpu_events.interrupt.pad' Field Local Information Disclosure Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2011-0123

Source: MISC
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525

Source: XF
Type: UNKNOWN
kernel-kvmvcpueventsinterrupt-info-disc(64519)

Source: XF
Type: UNKNOWN
kernel-kvmvcpueventsinterrupt-info-disc(64519)

Source: SUSE
Type: SUSE-SA:2011:020
Linux kernel security update

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/a:redhat:rhel_virtualization:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/a:redhat:rhel_virtualization:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/a:redhat:rhel_virtualization:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:rhel_virtualization:5:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20104525
    V
    CVE-2010-4525
    2021-06-25
    oval:org.mitre.oval:def:23178
    P
    ELSA-2011:0028: kvm security and bug fix update (Low)
    2014-05-26
    oval:org.mitre.oval:def:23550
    P
    ELSA-2011:0007: kernel security and bug fix update (Important)
    2014-05-26
    oval:org.mitre.oval:def:21679
    P
    RHSA-2011:0028: kvm security and bug fix update (Low)
    2014-02-24
    oval:org.mitre.oval:def:21719
    P
    RHSA-2011:0007: kernel security and bug fix update (Important)
    2014-02-24
    oval:com.redhat.rhsa:def:20110028
    P
    RHSA-2011:0028: kvm security and bug fix update (Low)
    2011-01-13
    oval:com.redhat.rhsa:def:20110007
    P
    RHSA-2011:0007: kernel security and bug fix update (Important)
    2011-01-11
    BACK
    linux linux kernel 2.6.33
    linux linux kernel 2.6.34
    linux linux kernel 2.6.33
    linux linux kernel 2.6.33 rc1
    linux linux kernel 2.6.33 rc2
    linux linux kernel 2.6.33 rc3
    linux linux kernel 2.6.33 rc4
    linux linux kernel 2.6.33 rc5
    linux linux kernel 2.6.33 rc6
    linux linux kernel 2.6.33 rc7
    linux linux kernel 2.6.33.1
    linux linux kernel 2.6.34 rc1
    linux linux kernel 2.6.33 rc8
    linux linux kernel 2.6.33.2
    linux linux kernel 2.6.34 rc2
    linux linux kernel 2.6.34 rc3
    linux linux kernel 2.6.34 rc4
    linux linux kernel 2.6.34
    linux linux kernel 2.6.34 rc5
    linux linux kernel 2.6.33.3
    linux linux kernel 2.6.33.4
    linux linux kernel 2.6.33.5
    linux linux kernel 2.6.33.6
    linux linux kernel 2.6.33.7
    redhat rhel virtualization 5
    redhat enterprise linux 6
    redhat enterprise linux 6
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6