The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
http://secunia.com/advisories/42758
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
http://www.mandriva.com/security/advisories?name=MDVSA-2010:247
http://www.openwall.com/lists/oss-security/2010/09/16/1
http://www.openwall.com/lists/oss-security/2010/09/16/3
http://www.redhat.com/support/errata/RHSA-2010-0842.html
http://www.ubuntu.com/usn/USN-1041-1
http://www.vupen.com/english/advisories/2010/3117
http://www.vupen.com/english/advisories/2011/0070
OR
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
OR
cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
OR
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
75550 | openSUSE Security Update : kernel (openSUSE-SU-2010:0655-1) | Nessus | SuSE Local Security Checks | high |
68103 | Oracle Linux 5 : kernel (ELSA-2010-0704) | Nessus | Oracle Linux Local Security Checks | high |
65101 | Ubuntu 10.04 LTS : linux-lts-backport-maverick vulnerabilities (USN-1083-1) | Nessus | Ubuntu Local Security Checks | critical |
63953 | RHEL 5 : kernel (RHSA-2010:0705) | Nessus | Red Hat Local Security Checks | high |
60893 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 | Nessus | Scientific Linux Local Security Checks | high |
54887 | Slackware current : 64-bit kernel (SSA:2010-265-01) | Nessus | Slackware Local Security Checks | high |
51611 | SuSE 11 Security Update : Linux kernel (SAT Patch Number 3164) | Nessus | SuSE Local Security Checks | high |
51453 | Ubuntu 9.10 / 10.04 LTS / 10.10 : linux, linux-ec2 vulnerabilities (USN-1041-1) | Nessus | Ubuntu Local Security Checks | high |
50981 | Mandriva Linux Security Advisory : kernel (MDVSA-2010:247) | Nessus | Mandriva Local Security Checks | high |
50924 | SuSE 11 / 11.1 Security Update : Linux kernel (SAT Patch Numbers 3144 / 3147 / 3148 / 3163 / 3171) | Nessus | SuSE Local Security Checks | high |
50629 | RHEL 6 : kernel (RHSA-2010:0842) | Nessus | Red Hat Local Security Checks | high |
49795 | Mandriva Linux Security Advisory : kernel (MDVSA-2010:198) | Nessus | Mandriva Local Security Checks | critical |
49671 | openSUSE Security Update : kernel (openSUSE-SU-2010:0664-1) | Nessus | SuSE Local Security Checks | critical |
49668 | openSUSE Security Update : kernel (openSUSE-SU-2010:0654-1) | Nessus | SuSE Local Security Checks | high |
49666 | Mandriva Linux Security Advisory : kernel (MDVSA-2010:188) | Nessus | Mandriva Local Security Checks | critical |
49639 | RHEL 5 : kernel (RHSA-2010:0704) | Nessus | Red Hat Local Security Checks | high |
49635 | Fedora 14 : kernel-2.6.35.4-28.fc14 (2010-14832) | Nessus | Fedora Local Security Checks | high |
49634 | CentOS 5 : kernel (CESA-2010:0704) | Nessus | CentOS Local Security Checks | high |
49297 | Fedora 13 : kernel-2.6.34.7-56.fc13 (2010-14890) | Nessus | Fedora Local Security Checks | high |
49296 | Fedora 12 : kernel-2.6.32.21-168.fc12 (2010-14878) | Nessus | Fedora Local Security Checks | high |
49283 | Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : linux, linux-source-2.6.15 vulnerabilities (USN-988-1) | Nessus | Ubuntu Local Security Checks | high |