The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2009-03-06 03:30
Updated : 2020-08-26 05:57
NVD link : CVE-2009-0834
Mitre link : CVE-2009-0834
JSON object : View
CWE
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server
- enterprise_linux_eus
suse
- linux_enterprise_desktop
- linux_enterprise_server
- linux_enterprise_software_development_kit
canonical
- ubuntu_linux
linux
- linux_kernel
debian
- debian_linux
opensuse
- opensuse