CVE-2009-0029
CVSS V2 High 7.2
CVSS V3 None
Description
The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call.
Overview
- CVE ID
- CVE-2009-0029
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Modified
- Published Version
- 2009-01-15T17:30:00
- Last Modified Date
- 2023-02-13T02:19:37
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 1 | OR | 2.6.28 | |
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:L/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- LOCAL
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 7.2
- Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 10
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2009-0029 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0029 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 17:53:32 | Added to TrackCVE | |||
2023-02-02 21:02:16 | 2023-02-02T19:15:45 | CVE Modified Date | updated | |
2023-02-02 21:02:16 | Analyzed | Modified | Vulnerability Status | updated |
2023-02-02 21:02:17 | The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call. | CVE-2009-0029 Linux Kernel insecure 64 bit system call argument passing | Description | updated |
2023-02-13 03:02:49 | 2023-02-13T02:19:37 | CVE Modified Date | updated | |
2023-02-13 03:02:49 | CVE-2009-0029 Linux Kernel insecure 64 bit system call argument passing | The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call. | Description | updated |