Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-4073Sensitive Information Exposure in Kernel

Severity
1.9LOWNVD
EPSS
0.3%
top 50.43%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedNov 29
Latest updateMay 13

Description

The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.

CVSS vector

AV:L/AC:M/C:P/I:N/A:NExploitability: 3.4 | Impact: 2.9

Affected Packages6 packages

Also affects: Debian Linux 5.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-rggc-q548-m285: The ipc subsystem in the Linux kernel before 22022-05-13
CVEList
CVE-2010-4073: The ipc subsystem in the Linux kernel before 22010-11-29

💥Exploits & PoCs

1
Exploit-DB
Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - 'Half-Nelson.c' Econet Privilege Escalation2011-09-05

📋Vendor Advisories

9
Ubuntu
Linux kernel (OMAP4) vulnerabilities2011-09-13
Ubuntu
Linux kernel vulnerabilities2011-08-09
Ubuntu
Linux Kernel vulnerabilities (Marvell Dove)2011-03-25
Ubuntu
Linux kernel vulnerabilities2011-03-03
Ubuntu
Linux kernel vulnerabilities2011-02-28

💬Community

1
Bugzilla
CVE-2010-4073 kernel: ipc/compat*.c: reading uninitialized stack memory2010-11-01
CVE-2010-4073 — Sensitive Information Exposure | cvebase