CVE-2009-0834

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.6 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 20%
VendorProductVersion
linuxlinux_kernel
𝑥
≤ 2.6.28.7
debiandebian_linux
4.0
debiandebian_linux
5.0
canonicalubuntu_linux
7.10
canonicalubuntu_linux
8.04
canonicalubuntu_linux
8.10
redhatenterprise_linux_desktop
4.0
redhatenterprise_linux_desktop
5.0
redhatenterprise_linux_eus
4.7
redhatenterprise_linux_eus
5.3
redhatenterprise_linux_server
4.0
redhatenterprise_linux_server
5.0
redhatenterprise_linux_server_aus
5.3
redhatenterprise_linux_workstation
4.0
redhatenterprise_linux_workstation
5.0
opensuseopensuse
10.3
opensuseopensuse
11.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
intrepid
Fixed 2.6.27-11.31
released
hardy
Fixed 2.6.24-23.52
released
gutsy
dne
dapper
dne
linux-source-2.6.15
intrepid
dne
hardy
dne
gutsy
dne
dapper
Fixed 2.6.15-54.76
released
linux-source-2.6.22
intrepid
dne
hardy
dne
gutsy
Fixed 2.6.22-16.62
released
dapper
dne
References