CVE-2007-4573

NameCVE-2007-4573
DescriptionThe IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1378-1, DSA-1378-2, DSA-1381-2, DSA-1504-1

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
fai-kernelssourcesarge1.9.1sarge8DSA-1504-1
fai-kernelssourceetch1.17+etch.13etch3DSA-1378-2
kernel-image-2.6.8-alphasourcesarge2.6.8-17sarge1DSA-1504-1
kernel-image-2.6.8-amd64sourcesarge2.6.8-17sarge1DSA-1504-1
kernel-image-2.6.8-hppasourcesarge2.6.8-7sarge1DSA-1504-1
kernel-image-2.6.8-i386sourcesarge2.6.8-17sarge1DSA-1504-1
kernel-image-2.6.8-ia64sourcesarge2.6.8-15sarge1DSA-1504-1
kernel-image-2.6.8-m68ksourcesarge2.6.8-5sarge1DSA-1504-1
kernel-image-2.6.8-s390sourcesarge2.6.8-6sarge1DSA-1504-1
kernel-image-2.6.8-sparcsourcesarge2.6.8-16sarge1DSA-1504-1
kernel-patch-powerpc-2.6.8sourcesarge2.6.8-13sarge1DSA-1504-1
kernel-source-2.6.8sourcesarge2.6.8-17sarge1DSA-1504-1
linux-2.6sourceetch2.6.18.dfsg.1-13etch4DSA-1381-2
linux-2.6source(unstable)2.6.22-5medium
user-mode-linuxsourceetch2.6.18-1um-2etch.13etch3DSA-1378-2

Search for package or bug name: Reporting problems