Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 261582 - Linux x86-64: syscall-audit: fix 32/64 syscall hole (CVE-2009-0834)
Summary: Linux x86-64: syscall-audit: fix 32/64 syscall hole (CVE-2009-0834)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://git.kernel.org/?p=linux/kernel...
Whiteboard: [linux <2.6.27.20] [linux >=2.6.28 <2...
Keywords:
Depends on:
Blocks:
 
Reported: 2009-03-07 17:10 UTC by Robert Buchholz (RETIRED)
Modified: 2013-09-12 04:42 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2009-03-07 17:10:32 UTC
CVE-2009-0834 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0834):
  The audit_syscall_entry function in the Linux kernel 2.6.28.7 and
  earlier on the x86_64 platform does not properly handle (1) a 32-bit
  process making a 64-bit syscall or (2) a 64-bit process making a
  32-bit syscall, which allows local users to bypass certain syscall
  audit configurations via crafted syscalls, a related issue to
  CVE-2009-0342 and CVE-2009-0343.