CVE-2009-0834
06.03.2009, 11:30
The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 ≤ 2.6.28.7 |
debian | debian_linux | 4.0 |
debian | debian_linux | 5.0 |
canonical | ubuntu_linux | 7.10 |
canonical | ubuntu_linux | 8.04 |
canonical | ubuntu_linux | 8.10 |
redhat | enterprise_linux_desktop | 4.0 |
redhat | enterprise_linux_desktop | 5.0 |
redhat | enterprise_linux_eus | 4.7 |
redhat | enterprise_linux_eus | 5.3 |
redhat | enterprise_linux_server | 4.0 |
redhat | enterprise_linux_server | 5.0 |
redhat | enterprise_linux_server_aus | 5.3 |
redhat | enterprise_linux_workstation | 4.0 |
redhat | enterprise_linux_workstation | 5.0 |
opensuse | opensuse | 10.3 |
opensuse | opensuse | 11.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
References