CVE Vulnerabilities

CVE-2010-3301

Improper Privilege Management

Published: Sep 22, 2010 | Modified: Nov 07, 2023
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
7.2 IMPORTANT
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V3
Ubuntu
HIGH

The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

Name Vendor Start Version End Version
Linux_kernel Linux * 2.6.36 (excluding)
Linux_kernel Linux 2.6.36 (including) 2.6.36 (including)
Linux_kernel Linux 2.6.36-rc1 (including) 2.6.36-rc1 (including)
Linux_kernel Linux 2.6.36-rc2 (including) 2.6.36-rc2 (including)
Linux_kernel Linux 2.6.36-rc3 (including) 2.6.36-rc3 (including)
Red Hat Enterprise Linux 6 RedHat kernel-0:2.6.32-71.7.1.el6 *
Linux Ubuntu jaunty *
Linux Ubuntu karmic *
Linux Ubuntu lucid *
Linux Ubuntu maverick *
Linux Ubuntu upstream *
Linux-ec2 Ubuntu karmic *
Linux-ec2 Ubuntu lucid *
Linux-ec2 Ubuntu upstream *
Linux-fsl-imx51 Ubuntu karmic *
Linux-fsl-imx51 Ubuntu lucid *
Linux-fsl-imx51 Ubuntu upstream *
Linux-lts-backport-maverick Ubuntu lucid *
Linux-lts-backport-maverick Ubuntu upstream *
Linux-source-2.6.15 Ubuntu upstream *

Potential Mitigations

References