The audit_syscall_entry function in the Linux kernel 2.6.28.7 and previous versions on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |
||
debian debian linux 5.0 |
||
debian debian linux 4.0 |
||
canonical ubuntu linux 7.10 |
||
canonical ubuntu linux 8.10 |
||
canonical ubuntu linux 8.04 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux desktop 4.0 |
||
redhat enterprise linux desktop 5.0 |
||
redhat enterprise linux eus 4.7 |
||
redhat enterprise linux server 4.0 |
||
redhat enterprise linux workstation 4.0 |
||
redhat enterprise linux server aus 5.3 |
||
redhat enterprise linux eus 5.3 |
||
opensuse opensuse 11.0 |
||
opensuse opensuse 10.3 |
||
suse linux enterprise server 10 |
||
suse linux enterprise desktop 10 |
||
suse linux enterprise software development kit 10 |