IRIX 6.5.24 vulnerability

According to SGI, "Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions /usr/sbin/cpr binary can be forced to load a user provided library while restarting the checkpointed process which can be used to obtain root user privileges."

For more go to ftp://patches.sgi.com/support/free/security/advisories/20040503-01-P.asc

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about SGI Australia

Show Comments