The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2009-03-06 11:30
Updated : 2025-04-09 00:30
NVD link : CVE-2009-0834
Mitre link : CVE-2009-0834
CVE.ORG link : CVE-2009-0834
JSON object : View
Products Affected
opensuse
- opensuse
redhat
- enterprise_linux_workstation
- enterprise_linux_server_aus
- enterprise_linux_desktop
- enterprise_linux_eus
- enterprise_linux_server
debian
- debian_linux
suse
- linux_enterprise_desktop
- linux_enterprise_server
- linux_enterprise_software_development_kit
linux
- linux_kernel
canonical
- ubuntu_linux
CWE