The MITRE CVE dictionary describes this issue as:
The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 22.214.171.124, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
Find out more about CVE-2007-4573 from the
MITRE CVE dictionary dictionary and
This issue affected users who were running 64-bit versions of Red Hat Enterprise Linux 3, 4, or 5 on x86_64 architecture. It did not affect users of Red Hat Enterprise Linux 2.1.
Updates are available for Red Hat Enterprise Linux 3, 4, and 5 to correct this issue. New kernel packages along with our advisory are available at the URL below as well as via the Red Hat Network. http://rhn.redhat.com/errata/CVE-2007-4573.html
Red Hat Security Errata
|Red Hat Enterprise Linux version 3 (kernel)
|Red Hat Enterprise Linux version 4 (kernel)
|Red Hat Enterprise Linux version 5 (kernel)
Red Hat would like to thank Wojciech Purczynski for reporting this issue.