CVE-2010-4072Sensitive Information Exposure in Kernel

Severity
1.9LOWNVD
EPSS
0.1%
top 78.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 29
Latest updateMay 13

Description

The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."

CVSS vector

AV:L/AC:M/C:P/I:N/A:NExploitability: 3.4 | Impact: 2.9

Affected Packages6 packages

Also affects: Debian Linux 5.0, Ubuntu Linux 10.04, 10.10, 6.06, 9.10

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3mf5-jc6x-rp7q: The copy_shmid_to_user function in ipc/shm2022-05-13
CVEList
CVE-2010-4072: The copy_shmid_to_user function in ipc/shm2010-11-29

📋Vendor Advisories

9
Ubuntu
Linux kernel (OMAP4) vulnerabilities2011-04-20
Ubuntu
Linux Kernel vulnerabilities (Marvell Dove)2011-03-25
Ubuntu
Linux kernel vulnerabilities2011-03-03
Ubuntu
Linux kernel vulnerabilities2011-02-28
Ubuntu
Linux kernel vulnerabilities2011-02-25

💬Community

1
Bugzilla
CVE-2010-4072 kernel: ipc/shm.c: reading uninitialized stack memory2010-11-01
CVE-2010-4072 — Sensitive Information Exposure | cvebase