CVE-2010-3301

The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register.  NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.2 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
linuxlinux_kernel
𝑥
< 2.6.36
linuxlinux_kernel
2.6.36
linuxlinux_kernel
2.6.36:rc1
linuxlinux_kernel
2.6.36:rc2
linuxlinux_kernel
2.6.36:rc3
canonicalubuntu_linux
9.10
canonicalubuntu_linux
10.04
canonicalubuntu_linux
10.10
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
maverick
Fixed 2.6.35-22.32
released
lucid
Fixed 2.6.32-24.43
released
karmic
Fixed 2.6.31-22.65
released
jaunty
Fixed 2.6.28-19.65
released
hardy
not-affected
dapper
dne
linux-ec2
maverick
not-affected
lucid
Fixed 2.6.32-311.23
released
karmic
Fixed 2.6.31-307.23
released
jaunty
dne
hardy
dne
dapper
dne
linux-fsl-imx51
maverick
dne
lucid
Fixed 2.6.31-608.22
released
karmic
Fixed 2.6.31-112.30
released
hardy
dne
dapper
dne
linux-lts-backport-maverick
maverick
dne
lucid
Fixed 2.6.35-25.44~lucid1
released
karmic
dne
hardy
dne
dapper
dne
linux-source-2.6.15
maverick
dne
lucid
dne
karmic
dne
jaunty
dne
hardy
dne
dapper
not-affected
References