logo
DATABASE RESOURCES PRICING ABOUT US

CVE-2009-0834

Description

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.


Affected Software


CPE Name Name Version
linux:linux_kernel linux linux kernel 2.6.28.7
debian:debian_linux debian debian linux 5.0
debian:debian_linux debian debian linux 4.0
canonical:ubuntu_linux canonical ubuntu linux 7.10
canonical:ubuntu_linux canonical ubuntu linux 8.10
canonical:ubuntu_linux canonical ubuntu linux 8.04
redhat:enterprise_linux_server redhat enterprise linux server 5.0
redhat:enterprise_linux_workstation redhat enterprise linux workstation 5.0
redhat:enterprise_linux_desktop redhat enterprise linux desktop 4.0
redhat:enterprise_linux_desktop redhat enterprise linux desktop 5.0
redhat:enterprise_linux_eus redhat enterprise linux eus 4.7
redhat:enterprise_linux_server redhat enterprise linux server 4.0
redhat:enterprise_linux_workstation redhat enterprise linux workstation 4.0
redhat:enterprise_linux_server_aus redhat enterprise linux server aus 5.3
redhat:enterprise_linux_eus redhat enterprise linux eus 5.3
opensuse:opensuse opensuse 11.0
opensuse:opensuse opensuse 10.3
suse:linux_enterprise_server suse linux enterprise server 10
suse:linux_enterprise_desktop suse linux enterprise desktop 10
suse:linux_enterprise_software_development_kit suse linux enterprise software development kit 10

Related