First published: Sat Jan 10 2009(Updated: )
The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=2.6.28 | |
Debian Linux | =5.0 | |
Debian Linux | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0029 has a medium severity rating, as it can lead to a denial of service.
To mitigate CVE-2009-0029, upgrade to a Linux kernel version later than 2.6.28.
CVE-2009-0029 affects local users on 64-bit s390, powerpc, sparc64, and mips platforms running Linux kernel versions 2.6.28 and earlier.
CVE-2009-0029 exploits the Linux kernel's inability to properly verify sign extension of 32-bit arguments in a 64-bit register.
Currently, the best workaround for CVE-2009-0029 is to ensure that user-mode applications do not pass improperly formatted arguments.