Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 260558 (CVE-2009-0028)

Summary: Kernel: <2.6.28 clone syscall allows arbitrary signals (CVE-2009-0028)
Product: Gentoo Security Reporter: Stefan Behte (RETIRED) <craig>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: hardened-kernel+disabled, kernel
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2d5516cbb9daf7d0e342a2e3b0fc6f8c39a81205
Whiteboard: [linux <2.6.27.20] [linux >=2.6.28 <2.6.28.8]
Package list:
Runtime testing required: ---

Description Stefan Behte (RETIRED) gentoo-dev Security 2009-02-27 21:57:03 UTC
CVE-2009-0028 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0028):
  The clone system call in the Linux kernel 2.6.28 and earlier allows
  local users to send arbitrary signals to a parent process from an
  unprivileged child process by launching an additional child process
  with the CLONE_PARENT flag, and then letting this new process exit.