CVE-2009-0835
06.03.2009, 11:30
The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 2.6.25 |
linux | linux_kernel | 2.6.25.1 |
linux | linux_kernel | 2.6.25.2 |
linux | linux_kernel | 2.6.25.3 |
linux | linux_kernel | 2.6.25.4 |
linux | linux_kernel | 2.6.25.5 |
linux | linux_kernel | 2.6.25.6 |
linux | linux_kernel | 2.6.25.7 |
linux | linux_kernel | 2.6.25.8 |
linux | linux_kernel | 2.6.25.9 |
linux | linux_kernel | 2.6.25.10 |
linux | linux_kernel | 2.6.25.11 |
linux | linux_kernel | 2.6.25.12 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References