Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0834

Опубликовано: 06 мар. 2009
Источник: ubuntu
Приоритет: low
CVSS2: 3.6

Описание

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

gutsy

DNE

hardy

released

2.6.24-23.52
intrepid

released

2.6.27-11.31
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-54.76
devel

DNE

gutsy

DNE

hardy

DNE

intrepid

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

gutsy

released

2.6.22-16.62
hardy

DNE

intrepid

DNE

upstream

needs-triage

Показывать по

3.6 Low

CVSS2

Связанные уязвимости

redhat
больше 16 лет назад

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.

nvd
больше 16 лет назад

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.

debian
больше 16 лет назад

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earl ...

github
около 3 лет назад

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.

oracle-oval
около 16 лет назад

ELSA-2009-0473: kernel security and bug fix update (IMPORTANT)

3.6 Low

CVSS2

Уязвимость CVE-2009-0834