CVE-2007-4573

Linux kernel <2.6.22.7 - Privilege Escalation

Title source: llm

Description

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Robert Swiecki · clocallinux_x86-64
https://www.exploit-db.com/exploits/4460
exploitdb WORKING POC VERIFIED
by Wojciech Purczynski · clocallinux
https://www.exploit-db.com/exploits/30604

References (39)

... and 19 more

Scores

EPSS 0.0042
EPSS Percentile 61.3%

Classification

CWE
CWE-264
Status draft

Affected Products (1)

linux/linux_kernel < 2.4.35

Timeline

Published Sep 24, 2007
Tracked Since Feb 18, 2026