CVE-2010-3301

EUVD-2010-3299
The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register.  NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.2 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
𝑥
< 2.6.36
linuxlinux_kernel
2.6.36
linuxlinux_kernel
2.6.36:rc1
linuxlinux_kernel
2.6.36:rc2
linuxlinux_kernel
2.6.36:rc3
canonicalubuntu_linux
9.10
canonicalubuntu_linux
10.04
canonicalubuntu_linux
10.10
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
dapper
dne
hardy
not-affected
jaunty
Fixed 2.6.28-19.65
released
karmic
Fixed 2.6.31-22.65
released
lucid
Fixed 2.6.32-24.43
released
maverick
Fixed 2.6.35-22.32
released
linux-ec2
dapper
dne
hardy
dne
jaunty
dne
karmic
Fixed 2.6.31-307.23
released
lucid
Fixed 2.6.32-311.23
released
maverick
not-affected
linux-fsl-imx51
dapper
dne
hardy
dne
karmic
Fixed 2.6.31-112.30
released
lucid
Fixed 2.6.31-608.22
released
maverick
dne
linux-lts-backport-maverick
dapper
dne
hardy
dne
karmic
dne
lucid
Fixed 2.6.35-25.44~lucid1
released
maverick
dne
linux-source-2.6.15
dapper
not-affected
hardy
dne
jaunty
dne
karmic
dne
lucid
dne
maverick
dne
References