Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 261589 (CVE-2009-0835)

Summary: Kernel: seccomp: 32/64 syscall hole (CVE-2009-0835)
Product: Gentoo Security Reporter: Robert Buchholz (RETIRED) <rbu>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: hardened-kernel+disabled, kernel
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5b1017404aea6d2e552e991b3fd814d839e9cd67
Whiteboard: [linux <2.6.27.20] [linux >=2.6.28 <2.6.28.8] [gp <2.6.27-12] [gp >=2.6.28-1 <2.6.28-5]
Package list:
Runtime testing required: ---

Description Robert Buchholz (RETIRED) gentoo-dev 2009-03-07 17:24:57 UTC
CVE-2009-0835 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0835):
  The __secure_computing function in kernel/seccomp.c in the seccomp
  subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64
  platform, when CONFIG_SECCOMP is enabled, does not properly handle
  (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process
  making a 32-bit syscall, which allows local users to bypass intended
  access restrictions via crafted syscalls that are misinterpreted as
  (a) stat or (b) chmod, a related issue to CVE-2009-0342 and
  CVE-2009-0343.