Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-4k1s-fghb-p3bb
Vulnerability ID VCID-4k1s-fghb-p3bb
Aliases CVE-2010-3301
Summary kernel: IA32 System Call Entry Point Vulnerability
Status Published
Exploitability 2.0
Weighted Severity 6.5
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
Reference id Reference type URL
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=36d001c70d8a0144ac1d038f6876c484849a74de
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eefdca043e8391dcd719711716492063030b55ac
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3301.json
https://api.first.org/data/v1/epss?cve=CVE-2010-3301
http://secunia.com/advisories/42758
http://sota.gen.nz/compat2/
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
http://www.mandriva.com/security/advisories?name=MDVSA-2010:247
http://www.openwall.com/lists/oss-security/2010/09/16/1
http://www.openwall.com/lists/oss-security/2010/09/16/3
http://www.redhat.com/support/errata/RHSA-2010-0842.html
http://www.ubuntu.com/usn/USN-1041-1
http://www.vupen.com/english/advisories/2010/3117
http://www.vupen.com/english/advisories/2011/0070
http://www.vupen.com/english/advisories/2011/0298
634449 https://bugzilla.redhat.com/show_bug.cgi?id=634449
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
CVE-2010-3301 https://nvd.nist.gov/vuln/detail/CVE-2010-3301
CVE-2010-3301;OSVDB-68192 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/15023.c
RHSA-2010:0842 https://access.redhat.com/errata/RHSA-2010:0842
USN-1041-1 https://usn.ubuntu.com/1041-1/
USN-1074-1 https://usn.ubuntu.com/1074-1/
USN-1074-2 https://usn.ubuntu.com/1074-2/
USN-1083-1 https://usn.ubuntu.com/1083-1/
USN-988-1 https://usn.ubuntu.com/988-1/
Data source Exploit-DB
Date added Sept. 16, 2010
Description Linux Kernel < 2.6.36-rc4-git2 (x86-64) - 'ia32syscall' Emulation Privilege Escalation
Ransomware campaign use Known
Source publication date Sept. 16, 2010
Exploit type local
Platform linux_x86-64
Source update date Nov. 28, 2016
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2010-3301
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.90784
EPSS Score 0.06169
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T14:57:04.431390+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3301.json 38.0.0