CVE-2009-0834 kernel: x86-64: syscall-audit: 32/64 syscall hole
Issue
- Fix request of CVE-2009-0834 on 5.2.z.
-
On x86-64, a 32-bit process (TIF_IA32) can switch to 64-bit mode with ljmp, and
then use the "syscall" instruction to make a 64-bit system call. A 64-bit
process make a 32-bit system call with int $0x80.
-
In both these cases, audit_syscall_entry() will use the wrong system call
number table and the wrong system call argument registers. This could be used
to circumvent a syscall audit configuration that filters based on the syscall
numbers or argument details.
Environment
- Red Hat Enterprise Linux 5 Update 2
- All architectures
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
