Linux ptrace x86_64 ia32syscall emulation exploit

This module exploits a vulnerability in Linux for x86_64. The IA32 system call emulation functionality does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to trigger an out-of-bounds access to the system call table using the %RAX register and escalate privileges.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Monday, November 19, 2007 - 00:00