The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
2010-09-22T19:00:03.323
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.2 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 2.6.36 | Yes |
Operating System | linux | linux_kernel | 2.6.36 | Yes |
Operating System | linux | linux_kernel | 2.6.36 | Yes |
Operating System | linux | linux_kernel | 2.6.36 | Yes |
Operating System | linux | linux_kernel | 2.6.36 | Yes |
Operating System | suse | linux_enterprise_real_time_extension | 11 | Yes |
Operating System | canonical | ubuntu_linux | 9.10 | Yes |
Operating System | canonical | ubuntu_linux | 10.04 | Yes |
Operating System | canonical | ubuntu_linux | 10.10 | Yes |