|
|
Subscribe / Log in / New account

kernel: out-of-bounds access

Package(s):kernel CVE #(s):CVE-2007-4573
Created:September 25, 2007 Updated:December 6, 2010
Description: The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
Alerts:
Mandriva MDVSA-2010:247 kernel 2010-12-03
Mandriva MDVSA-2010:188 kernel 2010-09-23
Mandriva MDVSA-2010:198 kernel 2010-10-07
Mandriva MDVSA-2008:105 kernel 2007-05-21
Debian DSA-1504 kernel-source-2.6.8 2008-02-22
Mandriva MDVSA-2008:008 kernel 2008-01-11
SuSE SUSE-SA:2007:064 kernel 2007-12-04
SuSE SUSE-SA:2007:053 kernel 2007-10-12
Mandriva MDKSA-2007:195 kernel 2007-10-15
Mandriva MDKSA-2007:196 kernel 2007-10-15
Debian DSA-1381-2 linux-2.6 2007-10-12
Debian DSA-1381-1 kernel 2007-10-02
Debian DSA-1378-2 linux-2.6 2007-09-28
Debian DSA-1378-1 linux-2.6 2007-09-27
Red Hat RHSA-2007:0938-01 kernel 2007-09-27
Red Hat RHSA-2007:0937-01 kernel 2007-09-27
Red Hat RHSA-2007:0936-01 kernel 2007-09-27
Ubuntu USN-518-1 linux-source-2.6.15/17/20 2007-09-25
rPath rPSA-2007-0198-1 kernel 2007-09-24
Fedora FEDORA-2007-712 kernel 2007-09-24
Fedora FEDORA-2007-2298 kernel 2007-09-25

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds