summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2009-0028
blob: bd9b13d24a33c93f191db195154f05c9bd890827 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Candidate: CVE-2009-0028
Description:
 The clone system call in the Linux kernel 2.6.28 and earlier allows local
 users to send arbitrary signals to a parent process from an unprivileged
 child process by launching an additional child process with the CLONE_PARENT
 flag, and then letting this new process exit. 
References:
 http://scary.beasts.org/security/CESA-2009-002.html
 http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-signal-vulnerability.html
 https://bugzilla.redhat.com/show_bug.cgi?id=479932
 http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html 
 2d5516cbb9d
Ubuntu-Description:
Notes:
Bugs:
upstream: released (2.6.29-rc8)
linux-2.6: released (2.6.29-1)
2.6.18-etch-security: released (2.6.18.dfsg.1-24etch1) [bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch]
2.6.24-etch-security: released (2.6.24-6~etchnhalf.8etch1) [bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch]
2.6.26-lenny-security: released (2.6.26-15lenny1) [bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
2.6.27-intrepid-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy