Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-rdyv-juby-e3gq
Vulnerability ID VCID-rdyv-juby-e3gq
Aliases CVE-2010-4077
Summary kernel: drivers/char/nozomi.c: reading uninitialized stack memory
Status Published
Exploitability 2.0
Weighted Severity 1.7
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862
http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03387.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4077.json
https://api.first.org/data/v1/epss?cve=CVE-2010-4077
http://secunia.com/advisories/42890
http://securityreason.com/securityalert/8129
http://www.openwall.com/lists/oss-security/2010/09/25/2
http://www.openwall.com/lists/oss-security/2010/10/06/6
http://www.openwall.com/lists/oss-security/2010/10/07/1
http://www.openwall.com/lists/oss-security/2010/10/25/3
http://www.redhat.com/support/errata/RHSA-2010-0958.html
http://www.redhat.com/support/errata/RHSA-2011-0007.html
http://www.securityfocus.com/bid/45059
648663 https://bugzilla.redhat.com/show_bug.cgi?id=648663
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVE-2010-4077 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/16973.c
CVE-2010-4077 https://nvd.nist.gov/vuln/detail/CVE-2010-4077
RHSA-2010:0958 https://access.redhat.com/errata/RHSA-2010:0958
RHSA-2011:0007 https://access.redhat.com/errata/RHSA-2011:0007
USN-1089-1 https://usn.ubuntu.com/1089-1/
USN-1092-1 https://usn.ubuntu.com/1092-1/
USN-1170-1 https://usn.ubuntu.com/1170-1/
USN-1183-1 https://usn.ubuntu.com/1183-1/
USN-1187-1 https://usn.ubuntu.com/1187-1/
USN-1202-1 https://usn.ubuntu.com/1202-1/
USN-1203-1 https://usn.ubuntu.com/1203-1/
USN-1204-1 https://usn.ubuntu.com/1204-1/
USN-1208-1 https://usn.ubuntu.com/1208-1/
USN-1216-1 https://usn.ubuntu.com/1216-1/
USN-1218-1 https://usn.ubuntu.com/1218-1/
Data source Exploit-DB
Date added March 14, 2011
Description Linux Kenel 2.6.37-rc1 - serial_core TIOCGICOUNT Leak
Ransomware campaign use Unknown
Source publication date March 14, 2011
Exploit type dos
Platform linux
Source update date March 14, 2011
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2010-4077
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.65059
EPSS Score 0.00482
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T14:57:04.683845+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4077.json 38.0.0