arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.
2015-05-27T10:59:06.127
2025-04-12T10:46:40.837
Deferred
CVSSv2: 1.9 (LOW)
AV:L/AC:M/Au:N/C:N/I:P/A:N
3.4
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | debian | debian_linux | 7.0 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Operating System | linux | linux_kernel | ≤ 3.19.1 | Yes |
Operating System | canonical | ubuntu_linux | 12.04 | Yes |