V
Scaner-VS
HomeCatalogSourcesCWECAPECATT&CKMitigationsDocs
CVE-2010-4083
DEB
LowConfirmedExploit available

The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local …

CVSS
1.9
Low
EPSS
0.00
p23
Published
2010-01-01
Updated
2010-01-01
Description

The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.

Tags · CWE
CWE-909
Affected products
Debian_linux
CVSS vector
AV:L/AC:M/Au:N/C:P/I:N/A:N
Timeline
2010-01-01
Published
2010-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: L
Local (L)
Attack Complexity
AC: M
Medium
Authentication
Au: N
None (N)
Confidentiality Impact
C: P
Partial
Integrity Impact
I: N
None (N)
Availability Impact
A: N
None (N)
Exploit indicators
EPSS
0.001 · p23
Known exploited (KEV)
No
Known exploits — Сканер-ВС
15024
exploitdb · https://www.exploit-db.com/exploits/15024
Enterprise
15150
exploitdb · https://www.exploit-db.com/exploits/15150
Enterprise
15622
exploitdb · https://www.exploit-db.com/exploits/15622
Enterprise
17787
exploitdb · https://www.exploit-db.com/exploits/17787
Enterprise
34987
exploitdb · https://www.exploit-db.com/exploits/34987
Enterprise
Affected software
ProductVendorStatus
kernelTracked
kernelTracked
kernelTracked
kernel-rtTracked
linuxTracked
linux-2.6Tracked
debian_linux*Tracked
linux_enterprise_desktop*Tracked
linux_enterprise_real_time_extension*Tracked
linux_enterprise_server*Tracked
linux_enterprise_software_development_kit*Tracked
linux_kernel*Tracked
opensuse*Tracked