Description
The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.
Published: 2009-03-06
Score: 3.6 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1800-1 New Linux 2.6.26 packages fix several vulnerabilities
EUVD EUVD EUVD-2009-0832 The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.
Ubuntu USN Ubuntu USN USN-751-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-752-1 Linux kernel vulnerabilities
History

No history.

Subscriptions

Linux Linux Kernel
Redhat Enterprise Mrg
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T04:48:52.370Z

Reserved: 2009-03-06T00:00:00.000Z

Link: CVE-2009-0835

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2009-03-06T11:30:02.657

Modified: 2025-04-09T00:30:58.490

Link: CVE-2009-0835

cve-icon Redhat

Severity : Important

Publid Date: 2009-02-25T00:00:00Z

Links: CVE-2009-0835 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses