Loading...
Loading...
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.
May 27, 2015
May 6, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2015-2830
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.