The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Linux_kernel | Linux | * | 2.4.35 (including) |
| Linux_kernel | Linux | * | 2.6.22.6 (including) |
| Red Hat Enterprise Linux 3 | RedHat | kernel-0:2.4.21-52.EL | * |
| Red Hat Enterprise Linux 4 | RedHat | kernel-0:2.6.9-55.0.9.EL | * |
| Red Hat Enterprise Linux 5 | RedHat | kernel-0:2.6.18-8.1.14.el5 | * |
| Linux | Ubuntu | upstream | * |
| Linux-source-2.6.15 | Ubuntu | dapper | * |
| Linux-source-2.6.17 | Ubuntu | edgy | * |
| Linux-source-2.6.20 | Ubuntu | feisty | * |
| Linux-source-2.6.22 | Ubuntu | gutsy | * |
| Xen-source | Ubuntu | feisty | * |
| Xen-source | Ubuntu | gutsy | * |