Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2007-4573

Published: 24 September 2007

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

Priority

High

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
hardy Not vulnerable
(2.6.22-13.40)
intrepid Not vulnerable
(2.6.22-13.40)
upstream
Released (2.6.22.6)
linux-source-2.6.15
Launchpad, Ubuntu, Debian
dapper
Released (2.6.15-29.60)
upstream Needs triage

linux-source-2.6.17
Launchpad, Ubuntu, Debian
edgy
Released (2.6.17.1-12.41)
upstream Needs triage

linux-source-2.6.20
Launchpad, Ubuntu, Debian
feisty
Released (2.6.20-16.32)
upstream Needs triage

linux-source-2.6.22
Launchpad, Ubuntu, Debian
gutsy
Released (2.6.22-13.40)
upstream Needs triage

xen-source
Launchpad, Ubuntu, Debian
feisty
Released (2.6.19-2ubuntu7.1)
gutsy Ignored
(end of life, was needed)
hardy Does not exist

intrepid Does not exist

upstream Needs triage