The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | * | 2.4.35 (including) |
Linux_kernel | Linux | * | 2.6.22.6 (including) |
Linux | Ubuntu | upstream | * |
Linux-source-2.6.15 | Ubuntu | dapper | * |
Linux-source-2.6.17 | Ubuntu | edgy | * |
Linux-source-2.6.20 | Ubuntu | feisty | * |
Linux-source-2.6.22 | Ubuntu | gutsy | * |
Xen-source | Ubuntu | feisty | * |
Xen-source | Ubuntu | gutsy | * |
Red Hat Enterprise Linux 3 | RedHat | kernel-0:2.4.21-52.EL | * |
Red Hat Enterprise Linux 4 | RedHat | kernel-0:2.6.9-55.0.9.EL | * |
Red Hat Enterprise Linux 5 | RedHat | kernel-0:2.6.18-8.1.14.el5 | * |