Skip to navigation

CVE Database

CVE-2010-3301

Impact: Important
Public: 2010-09-15
CWE: CWE-681->CWE-119
Bugzilla: 634449: CVE-2010-3301 kernel: IA32 System Call Entry Point Vulnerability

Details

The MITRE CVE dictionary describes this issue as:

The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.

Find out more about CVE-2010-3301 from the MITRE CVE dictionary and NIST NVD.

Statement

This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG, as they do not contain the upstream commit d4d67150 that introduced this flaw.

More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40330

CVSS v2 metrics

Base Score: 7.2
Base Metrics: AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector: Local
Access Complexity: Low
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux version 6 (kernel) RHSA-2010:0842 November 10, 2010

External References

Acknowledgements

Red Hat would like to thank Ben Hawkes for reporting this issue.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.