CVE-2009-0029

Priority
Description
The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64,
and mips 64-bit platforms requires that a 32-bit argument in a 64-bit
register was properly sign extended when sent from a user-mode application,
but cannot verify this, which allows local users to cause a denial of
service (crash) or possibly gain privileges via a crafted system call.
Ubuntu-Description
The 64-bit syscall interfaces did not correctly handle sign extension.
A local attacker could make malicious syscalls, possibly gaining root
privileges. The x86_64 architecture was not affected.
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.29~rc2)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2Fixed by bca268565fd18f0b36ab8fff6e1623d8dffae2b1
Package
Upstream:released (2.6.29~rc2)
Package
Upstream:released (2.6.29~rc2)
More Information

Updated: 2019-03-19 11:48:43 UTC (commit 15472795df7e9de45b82f2d36b8b419b939f97b2)