First published: Thu Jan 29 2009(Updated: )
Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Niels Provos Systrace | <=1.6e | |
Niels Provos Systrace | =1.1 | |
Niels Provos Systrace | =1.2 | |
Niels Provos Systrace | =1.3 | |
Niels Provos Systrace | =1.4 | |
Niels Provos Systrace | =1.5 | |
Niels Provos Systrace | =1.6 | |
Niels Provos Systrace | =1.6a | |
Niels Provos Systrace | =1.6b | |
Niels Provos Systrace | =1.6c | |
Niels Provos Systrace | =1.6d | |
Linux Linux kernel | =_nil_-_nil_ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.