First published: Thu Jan 29 2009(Updated: )
Niels Provos Systrace before 1.6f on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 64-bit syscall with a syscall number that corresponds to a policy-compliant 32-bit syscall.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Systrace | <=1.6e | |
Systrace | =1.1 | |
Systrace | =1.2 | |
Systrace | =1.3 | |
Systrace | =1.4 | |
Systrace | =1.5 | |
Systrace | =1.6 | |
Systrace | =1.6a | |
Systrace | =1.6b | |
Systrace | =1.6c | |
Systrace | =1.6d | |
Linux Kernel | =_nil_-_nil_ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0342 is categorized as a moderate severity vulnerability.
To remediate CVE-2009-0342, upgrade Systrace to version 1.6f or later.
CVE-2009-0342 affects Systrace versions from 1.1 up to and including 1.6e.
CVE-2009-0342 requires local user access to exploit, so it cannot be exploited remotely.
CVE-2009-0342 allows local users to bypass access restrictions by utilizing a specific syscall trick.