LOW · 3.6

CVE-2009-0834

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a ...

Vulnerability Description

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.

CVSS Score

3.6

LOW

AV:L/AC:L/Au:N/C:P/I:P/A:N
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
LinuxLinux Kernel<= 2.6.28.7
DebianDebian Linux4.0
CanonicalUbuntu Linux7.10
RedhatEnterprise Linux Desktop4.0
RedhatEnterprise Linux Eus4.7
RedhatEnterprise Linux Server4.0
RedhatEnterprise Linux Server Aus5.3
RedhatEnterprise Linux Workstation4.0
OpensuseOpensuse10.3
SuseLinux Enterprise Desktop10
SuseLinux Enterprise Server10
SuseLinux Enterprise Software Development Kit10

References

FAQ

What is CVE-2009-0834?

CVE-2009-0834 is a vulnerability with a CVSS score of 3.6 (LOW). The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a ...

How severe is CVE-2009-0834?

CVE-2009-0834 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2009-0834?

Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus.