Vulnerability Details : CVE-2010-3881
arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2010-3881
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 8 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-3881
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST |
CWE ids for CVE-2010-3881
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-3881
-
http://securitytracker.com/id?1024912
KVM Structure Initialization Error Lets Local Users Obtain Portions of Kernel Memory - SecurityTrackerThird Party Advisory;VDB Entry
-
http://openwall.com/lists/oss-security/2010/11/05/4
oss-security - Re: CVE request: kernel: kvm kernel stack leakageMailing List;Patch;Third Party Advisory
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=97e69aa62f8b5d338d6cff49be09e37cc1262838
-
http://openwall.com/lists/oss-security/2010/11/04/10
oss-security - CVE request: kernel: kvm kernel stack leakageMailing List;Patch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
[security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:20Mailing List;Third Party Advisory
-
http://www.vupen.com/english/advisories/2011/0124
Webmail | OVH- OVHPermissions Required
-
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
[security-announce] SUSE Security Announcement: Realtime Linux Kernel (SMailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=649920
649920 – (CVE-2010-3881) CVE-2010-3881 kvm: arch/x86/kvm/x86.c: reading uninitialized stack memoryIssue Tracking;Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/44666
Linux Kernel Multiple 'kvm/x86.c' Local Information Disclosure VulnerabilitiesPatch;Third Party Advisory;VDB Entry
-
http://www.vupen.com/english/advisories/2011/0298
Webmail | OVH- OVHPermissions Required
-
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
404: File not foundRelease Notes;Vendor Advisory
-
http://www.spinics.net/lists/kvm/msg44130.html
[patch v2] x86: kvm: x86: fix information leak to userland — Linux KVMPatch;Third Party Advisory
-
http://www.vupen.com/english/advisories/2010/3287
Webmail | OVH- OVHPermissions Required
-
http://git.kernel.org/?p=virt/kvm/kvm.git%3Ba=commit%3Bh=831d9d02f9522e739825a51a11e3bc5aa531a905
-
http://rhn.redhat.com/errata/RHSA-2010-0998.html
RHSA-2010:0998 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Products affected by CVE-2010-3881
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*