Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0835

Опубликовано: 06 мар. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 3.6

Описание

The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

gutsy

DNE

hardy

released

2.6.24-23.52
intrepid

released

2.6.27-11.31
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-54.76
devel

DNE

gutsy

DNE

hardy

DNE

intrepid

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

gutsy

released

2.6.22-16.62
hardy

DNE

intrepid

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 22%
0.00072
Низкий

3.6 Low

CVSS2

Связанные уязвимости

redhat
почти 17 лет назад

The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.

nvd
почти 17 лет назад

The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.

debian
почти 17 лет назад

The __secure_computing function in kernel/seccomp.c in the seccomp sub ...

github
больше 3 лет назад

The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.

fstec
почти 17 лет назад

Уязвимость ядра операционной системы Linux, позволяющая нарушителю обойти существующие ограничения доступа

EPSS

Процентиль: 22%
0.00072
Низкий

3.6 Low

CVSS2

Уязвимость CVE-2009-0835