Linux Kernel 32-bit System Call simulation layer Kernel Privilege Escalation Vulnerability
Release date:
Updated on: 2010-09-17
Affected Systems:
Linux kernel 2.6.x
Description:
--------------------------------------------------------------------------------
Cve id: CVE-2010-3301
Linux Kernel is the Kernel used by open source Linux.
The 32-bit System Call simulation layer does not ensure that the requested system call is in the system call table. Local users can use ptrace to obtain kernel permission improvement.
<* Source: H. Peter Anvin (hpa@linux.intel.com)
Link: http://secunia.com/advisories/41462/
Http://sota.gen.nz/compat2/
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Http://sota.gen.nz/compat2/robert_you_suck.c
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Linux
-----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://git.kernel.org /? P = linux/kernel/git/torvalds/linux-2.6.git; a = commitdiff; h = 36d001c70d8a0144ac1d038f6876c484849a74de