Niels Provos Systrace 1.6f and previous versions on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
niels_provos systrace 1.6b |
||
niels_provos systrace 1.6c |
||
niels_provos systrace 1.1 |
||
niels_provos systrace 1.2 |
||
niels_provos systrace 1.6d |
||
niels_provos systrace |
||
niels_provos systrace 1.3 |
||
niels_provos systrace 1.4 |
||
niels_provos systrace 1.5 |
||
niels_provos systrace 1.6 |
||
niels_provos systrace 1.6a |