CVE-2010-1085
Published Apr 6, 2010
Last updated 6 years ago
Overview
- Description
- The azx_position_ok function in hda_intel.c in Linux kernel 2.6.33-rc4 and earlier, when running on the AMD780V chip set, allows context-dependent attackers to cause a denial of service (crash) via unknown manipulations that trigger a divide-by-zero error.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 6.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-189
Vendor comments
- Red HatRed Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2010-1085 This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3 and Red Hat Enterprise MRG as they did not include the affected function. A future update in Red Hat Enterprise Linux 4 and 5 may address this flaw.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A01490AB-675E-4BA1-916D-F2A0D6CB27FD", "versionEndExcluding": "2.6.33" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DB53511-E1B0-4F81-BE9E-B52E84E9C30E" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "207306A0-19F5-4E49-945C-A5E4DD442459" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DE43C00-5967-44A1-ACEB-B7AF66EEBB53" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B33B5E4B-FCB3-4343-B992-F0ADB853754B" } ], "operator": "OR" } ] } ]