|Number of vulnerabilities||1|
|Public exploit||Not available|
|Vulnerable software versions||
The vulnerability allows a local attacker to bypass security restrictions on the target system.
The weakness exists due to insufficient security checks in the fktrace(2) processing tracing system call. A local attacker can make a specially crafted system call and bypass intended security restrictions.
Install update from vendor's website.