CVE-2007-4573
Linux kernel <2.6.22.7 - Privilege Escalation
Title source: llmDescription
The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Robert Swiecki · clocallinux_x86-64
https://www.exploit-db.com/exploits/4460
exploitdb
WORKING POC
VERIFIED
by Wojciech Purczynski · clocallinux
https://www.exploit-db.com/exploits/30604
References (39)
... and 19 more
Scores
EPSS
0.0042
EPSS Percentile
61.3%
Classification
CWE
CWE-264
Status
draft
Affected Products (1)
linux/linux_kernel
< 2.4.35
Timeline
Published
Sep 24, 2007
Tracked Since
Feb 18, 2026