Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-4573

Опубликовано: 24 сент. 2007
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 7.2

Описание

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

РелизСтатусПримечание
devel

not-affected

2.6.22-13.40
hardy

not-affected

2.6.22-13.40
intrepid

not-affected

2.6.22-13.40
upstream

released

2.6.22.6

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-29.60
upstream

needs-triage

Показывать по

РелизСтатусПримечание
edgy

released

2.6.17.1-12.41
upstream

needs-triage

Показывать по

РелизСтатусПримечание
feisty

released

2.6.20-16.32
upstream

needs-triage

Показывать по

РелизСтатусПримечание
gutsy

released

2.6.22-13.40
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

feisty

released

2.6.19-2ubuntu7.1
gutsy

ignored

end of life, was needed
hardy

DNE

intrepid

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 38%
0.00162
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

nvd
больше 17 лет назад

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

debian
больше 17 лет назад

The IA32 system call emulation functionality in Linux kernel 2.4.x and ...

github
около 3 лет назад

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

oracle-oval
больше 17 лет назад

ELSA-2007-0936: Important: kernel security update (IMPORTANT)

EPSS

Процентиль: 38%
0.00162
Низкий

7.2 High

CVSS2