Public Date:
487990: CVE-2009-0834 kernel: x86-64: syscall-audit: 32/64 syscall hole

The MITRE CVE dictionary describes this issue as:

The audit_syscall_entry function in the Linux kernel and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.

Find out more about CVE-2009-0834 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 3.6
Base Metrics AV:L/AC:L/Au:N/C:P/I:P/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux EUS (v. 5.2 server) (kernel) RHSA-2010:0079 2010-02-02
Red Hat Enterprise Linux 5 (kernel) RHSA-2009:0473 2009-05-07
MRG Grid for RHEL 5 Server (kernel-rt) RHSA-2009:0451 2009-04-29
Red Hat Enterprise Linux 4 (kernel) RHSA-2009:0459 2009-04-30


Last Modified

CVE description copyright © 2017, The MITRE Corporation