Candidate: CVE-2009-0028 Description: The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit. References: http://scary.beasts.org/security/CESA-2009-002.html http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-signal-vulnerability.html https://bugzilla.redhat.com/show_bug.cgi?id=479932 http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html 2d5516cbb9d Ubuntu-Description: Notes: Bugs: upstream: released (2.6.29-rc8) linux-2.6: released (2.6.29-1) 2.6.18-etch-security: released (2.6.18.dfsg.1-24etch1) [bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.8etch1) [bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch] 2.6.26-lenny-security: released (2.6.26-15lenny1) [bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch] 2.6.15-dapper-security: 2.6.22-gutsy-security: 2.6.24-hardy-security: 2.6.27-intrepid-security: