Описание
Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes.
Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2009-0343
- http://scary.beasts.org/security/CESA-2009-001.html
- http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html
- http://www.citi.umich.edu/u/provos/systrace
- http://www.securityfocus.com/archive/1/500377/100/0/threaded
- http://www.securityfocus.com/bid/33417
EPSS
CVE ID
Связанные уязвимости
Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes.
Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform al ...
EPSS