The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
07 Nov 2023, 02:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2009-03-06 11:30
Updated : 2024-02-28 11:21
NVD link : CVE-2009-0834
Mitre link : CVE-2009-0834
CVE.ORG link : CVE-2009-0834
JSON object : View
Products Affected
linux
- linux_kernel
suse
- linux_enterprise_desktop
- linux_enterprise_software_development_kit
- linux_enterprise_server
opensuse
- opensuse
redhat
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_server
- enterprise_linux_eus
- enterprise_linux_workstation
debian
- debian_linux
canonical
- ubuntu_linux
CWE