Name | CVE-2007-4573 |
Description | The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-1378-1, DSA-1378-2, DSA-1381-2, DSA-1504-1 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
fai-kernels | source | sarge | 1.9.1sarge8 | DSA-1504-1 | ||
fai-kernels | source | etch | 1.17+etch.13etch3 | DSA-1378-2 | ||
kernel-image-2.6.8-alpha | source | sarge | 2.6.8-17sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-amd64 | source | sarge | 2.6.8-17sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-hppa | source | sarge | 2.6.8-7sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-i386 | source | sarge | 2.6.8-17sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-ia64 | source | sarge | 2.6.8-15sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-m68k | source | sarge | 2.6.8-5sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-s390 | source | sarge | 2.6.8-6sarge1 | DSA-1504-1 | ||
kernel-image-2.6.8-sparc | source | sarge | 2.6.8-16sarge1 | DSA-1504-1 | ||
kernel-patch-powerpc-2.6.8 | source | sarge | 2.6.8-13sarge1 | DSA-1504-1 | ||
kernel-source-2.6.8 | source | sarge | 2.6.8-17sarge1 | DSA-1504-1 | ||
linux-2.6 | source | etch | 2.6.18.dfsg.1-13etch4 | DSA-1381-2 | ||
linux-2.6 | source | (unstable) | 2.6.22-5 | medium | ||
user-mode-linux | source | etch | 2.6.18-1um-2etch.13etch3 | DSA-1378-2 |