{"vuid":"VU#337238","idnumber":"337238","name":"Red Hat Enterprise Linux kernel-2.4.21 does not perform adequate checking of eflags when in 32-bit ptrace emulation mode","keywords":["Red Hat Enterprise","Linux","kernel","AMD64","eflags","32-bit ptrace emulation"],"overview":"Red Hat Enterprise Linux kernel prior to version 2.4.21 does not perform adequate checking of eflags when in 32-bit ptrace emulation mode. This could allow a local user to gain elevated or root privileges.","clean_desc":"The Linux kernel handles the basic functionality of the operating system. There is a vulnerability in the checking of eflags when in 32-bit ptrace emulation mode allowing a local user to gain elevated or root privileges. This vulnerability is reported to only affect kernels built for the AMD64 architecture.","impact":"A local user could gain elevated or root privileges.","resolution":"Upgrade or Apply Patch\nUpgrade or apply patch as specified by your vendor.","workarounds":"","sysaffected":"","thanks":"Thanks to \nRed Hat Inc. for the information contained in their advisory.","author":"This document was written by Damon Morda.","public":["https://rhn.redhat.com/errata/RHSA-2004-017.html","http://www.secunia.com/advisories/10658/","http://www.ciac.org/ciac/bulletins/o-063.shtml"],"cveids":["CVE-2004-0001"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-01-19T15:43:11Z","publicdate":"2004-01-16T00:00:00Z","datefirstpublished":"2004-01-20T14:50:29Z","dateupdated":"2004-01-20T16:14:35Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"7","cam_impact":"15","cam_easeofexploitation":"6","cam_attackeraccessrequired":"10","cam_scorecurrent":"2.953125","cam_scorecurrentwidelyknown":"3.54375","cam_scorecurrentwidelyknownexploited":"5.90625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.953125,"vulnote":null}