CVE-2009-0835
Published Mar 6, 2009
Last updated 13 years ago
Overview
- Description
- The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.6
- Impact score
- 4.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Vendor comments
- Red HatThis issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5. It was addressed in Red Hat Enterprise MRG via: https://rhn.redhat.com/errata/RHSA-2009-0451.html .
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ED1BAE4-A6D3-49A1-BCAD-1E514D42F609" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F7C4DFF-616C-497D-9BAB-67C2E21BC21D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6EBBFE8-2332-45CE-93F8-6815C2AE5D17" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "388414A1-C9B4-41BA-AD35-6501A463A095" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDBA01DD-C129-48F1-800B-838418F4A4A4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "185F1EF8-04EB-43ED-B909-8BDF60F23E76" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9D4BCAD-B3CD-4FA1-A833-0D7D40289E07" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3483FAFA-353C-498F-AF68-8F5B84A0F30D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3D5AEA5-210B-4E9F-8D9C-C25B84F15C75" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B11A9E1-9D90-46DC-81B5-17A137205AB3" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07EEC559-9240-46BE-9057-0F17D1F61F99" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBBC127F-D67E-43FE-BCFE-606C200084F4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42B18945-EE09-4E6B-8C11-E382E5F8F850" } ], "operator": "OR" } ] } ]