Vulnerability Description
The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 2.6.28.7 |
| Debian | Debian Linux | 4.0 |
| Canonical | Ubuntu Linux | 7.10 |
| Redhat | Enterprise Linux Desktop | 4.0 |
| Redhat | Enterprise Linux Eus | 4.7 |
| Redhat | Enterprise Linux Server | 4.0 |
| Redhat | Enterprise Linux Server Aus | 5.3 |
| Redhat | Enterprise Linux Workstation | 4.0 |
| Opensuse | Opensuse | 10.3 |
| Suse | Linux Enterprise Desktop | 10 |
| Suse | Linux Enterprise Server | 10 |
| Suse | Linux Enterprise Software Development Kit | 10 |
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.htmlMailing ListThird Party Advisory
- http://marc.info/?l=linux-kernel&m=123579056530191&w=2Third Party Advisory
- http://marc.info/?l=linux-kernel&m=123579065130246&w=2Third Party Advisory
- http://marc.info/?l=oss-security&m=123597642832637&w=2Third Party Advisory
- http://rhn.redhat.com/errata/RHSA-2009-0459.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2009-0473.htmlThird Party Advisory
- http://scary.beasts.org/security/CESA-2009-001.htmlThird Party Advisory
- http://secunia.com/advisories/34084Third Party Advisory
- http://secunia.com/advisories/34917Third Party Advisory
- http://secunia.com/advisories/34962Third Party Advisory
- http://secunia.com/advisories/34981Third Party Advisory
- http://secunia.com/advisories/35011Third Party Advisory
FAQ
What is CVE-2009-0834?
CVE-2009-0834 is a vulnerability with a CVSS score of 3.6 (LOW). The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a ...
How severe is CVE-2009-0834?
CVE-2009-0834 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0834?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus.