4.4
CVSSv2

CVE-2009-1337

Published: 22/04/2009 Updated: 10/10/2018
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
VMScore: 452
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The exit_notify function in kernel/exit.c in the Linux kernel prior to 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.11.1

linux linux kernel 2.6.11.2

linux linux kernel 2.6.11.4

linux linux kernel 2.6.11.5

linux linux kernel 2.6.12.5

linux linux kernel 2.6.12.4

linux linux kernel 2.6.13.4

linux linux kernel 2.6.14.7

linux linux kernel 2.6.14.4

linux linux kernel 2.6.14.1

linux linux kernel 2.6.15.7

linux linux kernel 2.6.15.6

linux linux kernel 2.6.16.12

linux linux kernel 2.6.16.14

linux linux kernel 2.6.16.25

linux linux kernel 2.6.16.28

linux linux kernel 2.6.16.34

linux linux kernel 2.6.16.35

linux linux kernel 2.6.16.39

linux linux kernel 2.6.16.48

linux linux kernel 2.6.16.44

linux linux kernel 2.6.16.4

linux linux kernel 2.6.16.40

linux linux kernel 2.6.16.56

linux linux kernel 2.6

linux linux kernel 2.6.11.10

linux linux kernel 2.6.11.6

linux linux kernel 2.6.11.8

linux linux kernel 2.6.13

linux linux kernel 2.6.12.6

linux linux kernel 2.6.15

linux linux kernel 2.6.14.5

linux linux kernel 2.6.14.2

linux linux kernel 2.6.15.3

linux linux kernel 2.6.15.5

linux linux kernel 2.6.16.1

linux linux kernel 2.6.16.13

linux linux kernel 2.6.16.16

linux linux kernel 2.6.16.27

linux linux kernel 2.6.16.22

linux linux kernel 2.6.16.21

linux linux kernel 2.6.16.36

linux linux kernel 2.6.16.30

linux linux kernel 2.6.0

linux linux kernel 2.6.11

linux linux kernel 2.6.12.2

linux linux kernel 2.6.11.3

linux linux kernel 2.6.12.1

linux linux kernel 2.6.12

linux linux kernel 2.6.12.3

linux linux kernel 2.6.13.5

linux linux kernel 2.6.13.3

linux linux kernel 2.6.14

linux linux kernel 2.6.14.3

linux linux kernel 2.6.15.2

linux linux kernel 2.6.16

linux linux kernel 2.6.16.20

linux linux kernel 2.6.16.19

linux linux kernel 2.6.16.29

linux linux kernel 2.6.16.26

linux linux kernel 2.6.16.23

linux linux kernel 2.6.16.33

linux linux kernel 2.6.16.37

linux linux kernel 2.6.16.38

linux linux kernel 2.6.16.42

linux linux kernel 2.6.16.43

linux linux kernel 2.6.16.5

linux linux kernel 2.6.16.57

linux linux kernel 2.6.16.6

linux linux kernel 2.6.17

linux linux kernel 2.6.17.4

linux linux kernel 2.6.17.14

linux linux kernel 2.6.17.5

linux linux kernel 2.6.17.11

linux linux kernel 2.6.18.1

linux linux kernel 2.6.17.9

linux linux kernel 2.6.17.6

linux linux kernel 2.6.18.7

linux linux kernel 2.6.18

linux linux kernel 2.6.18.6

linux linux kernel 2.6.19

linux linux kernel 2.6.2

linux linux kernel 2.6.20.11

linux linux kernel 2.6.20.12

linux linux kernel 2.6.20.4

linux linux kernel 2.6.20.5

linux linux kernel 2.6.20.19

linux linux kernel 2.6.22

linux linux kernel 2.6.21

linux linux kernel 2.6.21.1

linux linux kernel 2.6.22.11

linux linux kernel 2.6.22.16

linux linux kernel 2.6.22.21

linux linux kernel 2.6.22.20

linux linux kernel 2.6.23

linux linux kernel 2.6.23.10

linux linux kernel 2.6.23.2

linux linux kernel 2.6.23.6

linux linux kernel 2.6.23.9

linux linux kernel 2.6.24.5

linux linux kernel 2.6.24.6

linux linux kernel 2.6.22_rc7

linux linux kernel 2.6.22_rc1

linux linux kernel 2.6.25.12

linux linux kernel 2.6.25.11

linux linux kernel 2.6.25.7

linux linux kernel 2.6.25.5

linux linux kernel 2.6.25.4

linux linux kernel 2.6.25.8

linux linux kernel 2.6.25.16

linux linux kernel 2.6.25.3

linux linux kernel 2.6.26

linux linux kernel 2.6.26.2

linux linux kernel 2.6.27

linux linux kernel 2.6.27.11

linux linux kernel 2.6.27.7

linux linux kernel 2.2.27

linux linux kernel 2.4.36.4

linux linux kernel 2.6.28

linux linux kernel 2.6.28.1

linux linux kernel 2.6.28.2

linux linux kernel 2.6.29

linux linux kernel 2.6.6

linux linux kernel 2.6.7

linux linux kernel 2.6.16.55

linux linux kernel 2.6.16.61

linux linux kernel 2.6.16.62

linux linux kernel 2.6.17.2

linux linux kernel 2.6.17.3

linux linux kernel 2.6.18.3

linux linux kernel 2.6.17.7

linux linux kernel 2.6.18.8

linux linux kernel 2.6.19.2

linux linux kernel 2.6.19.1

linux linux kernel 2.6.20.13

linux linux kernel 2.6.20.14

linux linux kernel 2.6.20.6

linux linux kernel 2.6.20.7

linux linux kernel 2.6.21.4

linux linux kernel 2.6.21.6

linux linux kernel 2.6.21.2

linux linux kernel 2.6.22.14

linux linux kernel 2.6.22.12

linux linux kernel 2.6.22.13

linux linux kernel 2.6.22.7

linux linux kernel 2.6.22.19

linux linux kernel 2.6.23.11

linux linux kernel 2.6.23.1

linux linux kernel 2.6.23.13

linux linux kernel 2.6.23.5

linux linux kernel 2.6.23.4

linux linux kernel 2.6.24

linux linux kernel 2.6.24.7

linux linux kernel 2.6.25.19

linux linux kernel 2.6.25.20

linux linux kernel 2.6.25.9

linux linux kernel 2.6.25.2

linux linux kernel 2.6.25.17

linux linux kernel 2.6.25.1

linux linux kernel 2.6.26.8

linux linux kernel 2.6.26.7

linux linux kernel 2.6.27.5

linux linux kernel 2.6.27.6

linux linux kernel 2.4.36.5

linux linux kernel 2.4.36.1

linux linux kernel 2.6.28.3

linux linux kernel 2.6.28.4

linux linux kernel 2.6.28.5

linux linux kernel 2.6.8

linux linux kernel 2.6.8.1

linux linux kernel 2.6.16.47

linux linux kernel 2.6.16.46

linux linux kernel 2.6.16.52

linux linux kernel 2.6.16.51

linux linux kernel 2.6.16.54

linux linux kernel 2.6.16.53

linux linux kernel 2.6.16.9

linux linux kernel 2.6.16.60

linux linux kernel 2.6.17.1

linux linux kernel 2.6.17.12

linux linux kernel 2.6.18.2

linux linux kernel 2.6.18.5

linux linux kernel 2.6.19.7

linux linux kernel 2.6.19.5

linux linux kernel 2.6.20

linux linux kernel 2.6.19.3

linux linux kernel 2.6.20.15

linux linux kernel 2.6.20.18

linux linux kernel 2.6.20.8

linux linux kernel 2.6.20.21

linux linux kernel 2.6.21.3

linux linux kernel 2.6.21.7

linux linux kernel 2.6.22.15

linux linux kernel 2.6.22.17

linux linux kernel 2.6.22.18

linux linux kernel 2.6.22.5

linux linux kernel 2.6.22.2

linux linux kernel 2.6.22.6

linux linux kernel 2.6.22.3

linux linux kernel 2.6.23.12

linux linux kernel 2.6.23.15

linux linux kernel 2.6.23.3

linux linux kernel 2.6.23.14

linux linux kernel 2.6.24.1

linux linux kernel 2.6.24.2

linux linux kernel 2.6.25.10

linux linux kernel 2.6.25.6

linux linux kernel 2.6.25.13

linux linux kernel 2.6.26.1

linux linux kernel 2.6.26.6

linux linux kernel 2.6.27.8

linux linux kernel 2.6.27.10

linux linux kernel 2.6.27.1

linux linux kernel 2.6.27.2

linux linux kernel 2.4.36

linux linux kernel 2.4.36.3

linux linux kernel 2.6.28.6

linux linux kernel 2.6.28.7

linux linux kernel 2.6.3

linux linux kernel 2.6.9

linux linux kernel

linux linux kernel 2.6.1

linux linux kernel 2.6.10

linux linux kernel 2.6.11.12

linux linux kernel 2.6.11.11

linux linux kernel 2.6.11.7

linux linux kernel 2.6.11.9

linux linux kernel 2.6.13.2

linux linux kernel 2.6.13.1

linux linux kernel 2.6.14.6

linux linux kernel 2.6.15.1

linux linux kernel 2.6.15.4

linux linux kernel 2.6.16.11

linux linux kernel 2.6.16.10

linux linux kernel 2.6.16.18

linux linux kernel 2.6.16.17

linux linux kernel 2.6.16.15

linux linux kernel 2.6.16.2

linux linux kernel 2.6.16.3

linux linux kernel 2.6.16.24

linux linux kernel 2.6.16.31

linux linux kernel 2.6.16.32

linux linux kernel 2.6.16.45

linux linux kernel 2.6.16.41

linux linux kernel 2.6.16.50

linux linux kernel 2.6.16.49

linux linux kernel 2.6.16.8

linux linux kernel 2.6.16.7

linux linux kernel 2.6.16.59

linux linux kernel 2.6.16.58

linux linux kernel 2.6.17.13

linux linux kernel 2.6.17.10

linux linux kernel 2.6.18.4

linux linux kernel 2.6.17.8

linux linux kernel 2.6.19.6

linux linux kernel 2.6.19.4

linux linux kernel 2.6.20.16

linux linux kernel 2.6.20.10

linux linux kernel 2.6.20.17

linux linux kernel 2.6.20.1

linux linux kernel 2.6.20.3

linux linux kernel 2.6.20.2

linux linux kernel 2.6.20.20

linux linux kernel 2.6.20.9

linux linux kernel 2.6.21.5

linux linux kernel 2.6.22.1

linux linux kernel 2.6.22.10

linux linux kernel 2.6.22.4

linux linux kernel 2.6.22.22

linux linux kernel 2.6.22.8

linux linux kernel 2.6.22.9

linux linux kernel 2.6.23.17

linux linux kernel 2.6.23.16

linux linux kernel 2.6.23.7

linux linux kernel 2.6.23.8

linux linux kernel 2.6.24.3

linux linux kernel 2.6.24.4

linux linux kernel 2.6.25

linux linux kernel 2.6.25.15

linux linux kernel 2.6.25.18

linux linux kernel 2.6.25.14

linux linux kernel 2.6.26.3

linux linux kernel 2.6.26.4

linux linux kernel 2.6.26.5

linux linux kernel 2.6.27.9

linux linux kernel 2.6.27.12

linux linux kernel 2.6.27.3

linux linux kernel 2.6.27.4

linux linux kernel 2.4.36.2

linux linux kernel 2.4.36.6

linux linux kernel 2.6.28.8

linux linux kernel 2.6.28.9

linux linux kernel 2.6.4

linux linux kernel 2.6.5

Vendor Advisories

Synopsis Important: Red Hat Enterprise Linux 48 kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages are now available as part of the ongoing supportand maintenance of Red Hat Enterprise Linux version 4 This is the eighthregular updateThese updated p ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix two security issues and two bugs are nowavailable for Red Hat Enterprise Linux 47 Extended Update SupportThis update has been rated as having important security impact b ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues and several bugsare now available for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Secur ...
Igor Zhbanov discovered that NFS clients were able to create device nodes even when root_squash was enabled An authenticated remote attacker could create device nodes with open permissions, leading to a loss of privacy or escalation of privileges Only Ubuntu 810 and 904 were affected (CVE-2009-1072) ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-4307 Bryn M Reeves reported a denial of service in the NFS filesystem Local users can trigger a kernel BUG() due to a r ...

Exploits

#!/bin/sh ################################################################################### # gw-notexitsh: Linux kernel <2629 exit_notify() local root exploit # # by Milen Rangelov (gat3way-at-gat3way-dot-eu) # # Based on 'exit_notify()' CAP_KILL verification bug found by Oleg Nestorov # Basically it allows us to send arbi ...

Github Repositories

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820) CVE-2017-1000112  [a memory corruption due to UFO to non-UFO path switch] CVE-2017-7494  [Samba Remote execution] (Samba 350-464/4510/4414) CVE-2017-7308  [a signedness issue in AF_PACKET sockets]

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820) CVE-2017-1000112  [a memory corruption due to UFO to non-UFO path switch] CVE-2017-7494  [Samba Remote execution] (Samba 350-464/4510/4414) CVE-2017-7308  [a signedness issue in AF_PACKET sockets]

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE–2018–1000001  [glibc] (glibc <= 226) CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820) CVE-2017-1000112  [a memory corruption due to UFO to non-UFO path switch] CVE-2017-16995  [Memory corruption caused by BPF verifier] (Linux kern

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE–2018–1000001  [glibc] (glibc <= 226) CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820) CVE-2017-1000112  [a memory corruption due to UFO to non-UFO path switch] CVE-2017-16995  [Memory corruption caused by BPF verifier] (Linux kern

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE–2018–18955  [map_write() in kernel/user_namespacec allows privilege escalation] (Linux kernel 415x through 419x before 4192) CVE–2018–1000001  [glibc] (glibc <= 226) CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820)

What's this This project is mainly used to collect the exp for Linux platform privilege promotion, only to help penetration testers quickly achieve privilege promotion in actual combat Information CVE ID Description Kernels CVE-2004-0077 Linux Kernel 2420, 2224, 2425, 2426, 2427 CVE-2004-1235 Linux Kernel 2429 CVE-2005-0736 Linux Kernel 265, 267,

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE–2018–18955  [map_write() in kernel/user_namespacec allows privilege escalation] (Linux kernel 415x through 419x before 4192) CVE–2018–1000001  [glibc] (glibc <= 226) CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820)

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE–2018–18955  [map_write() in kernel/user_namespacec allows privilege escalation] (Linux kernel 415x through 419x before 4192) CVE–2018–1000001  [glibc] (glibc <= 226) CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820)

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE–2018–18955  [map_write() in kernel/user_namespacec allows privilege escalation] (Linux kernel 415x through 419x before 4192) CVE–2018–1000001  [glibc] (glibc <= 226) CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820)

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820) CVE-2017-1000112  [a memory corruption due to UFO to non-UFO path switch] CVE-2017-7494  [Samba Remote execution] (Samba 350-464/4510/4414) CVE-2017-7308  [a signedness issue in AF_PACKET sockets]

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820) CVE-2017-1000112  [a memory corruption due to UFO to non-UFO path switch] CVE-2017-7494  [Samba Remote execution] (Samba 350-464/4510/4414) CVE-2017-7308  [a signedness issue in AF_PACKET sockets]

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820) CVE-2017-1000112  [a memory corruption due to UFO to non-UFO path switch] CVE-2017-7494  [Samba Remote execution] (Samba 350-464/4510/4414) CVE-2017-7308  [a signedness issue in AF_PACKET sockets]

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820) CVE-2017-1000112  [a memory corruption due to UFO to non-UFO path switch] CVE-2017-7494  [Samba Remote execution] (Samba 350-464/4510/4414) CVE-2017-7308  [a signedness issue in AF_PACKET sockets]

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE–2018–1000001  [glibc] (glibc <= 226) CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820) CVE-2017-1000112  [a memory corruption due to UFO to non-UFO path switch] CVE-2017-16995  [Memory corruption caused by BPF verifier] (Linux kern

Linux kernel EoP exp

linux-kernel-exploits 简介 在github项目:githubcom/SecWiki/linux-kernel-exploits 的基础上增加了最近几年的提权漏洞Exp,漏洞相关信息的搜集在对应漏洞文件夹下的Readmemd。 红队攻击时,可以通过脚本:githubcom/mzet-/linux-exploit-suggester/blob/master/linux-exploit-suggestersh 评估系统可能受到哪些提

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE–2018–18955  [map_write() in kernel/user_namespacec allows privilege escalation] (Linux kernel 415x through 419x before 4192) CVE–2018–1000001  [glibc] (glibc <= 226) CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820)

linux-kernel-exploits Linux平台提权漏洞集合

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE–2018–18955  [map_write() in kernel/user_namespacec allows privilege escalation] (Linux kernel 415x through 419x before 4192) CVE–2018–1000001  [glibc] (glibc <= 226) CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820)

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE–2018–18955  [map_write() in kernel/user_namespacec allows privilege escalation] (Linux kernel 415x through 419x before 4192) CVE–2018–1000001  [glibc] (glibc <= 226) CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820)

linux-kernel-exploits 简介 linux-kernel-exploits 漏洞列表 #CVE  #Description  #Kernels CVE–2018–18955  [map_write() in kernel/user_namespacec allows privilege escalation] (Linux kernel 415x through 419x before 4192) CVE–2018–1000001  [glibc] (glibc <= 226) CVE-2017-1000367  [Sudo] (Sudo 186p7 - 1820)

Linux Elevation(持续更新)

Linux Elvation This project is for Linux Elvation Vulnerable list #CVE  #Description  #Kernels CVE-2021-3156[Sudo 182 - 1831p2 Sudo 190 - 195p1] CVE-2020-9470[Wing FTP Server 625 - Privilege Escalation] CVE-2020-8635[Wing FTP Server 623 - Privilege Escalation] CVE-2020-8835[Linux Kernel 54 or Linux Kernel 54] CVE-2019-7304 [2342ubuntu01 or 23

Localroot-ALL-CVE~

Localroot Collection Linux 2001 // CVE N/A | Sudo prompt overflow in v157 to 165p2 2002 // CVE-2003-0961 | Linux Kernel 2422 - 'do_brk()' Local Privilege Escalation 2003 // CVE-2003-0127 | Linux Kernel 22x/24x (RedHat) - 'ptrace/kmod' Local Privilege Escalation CVE-2003-0961 | Linux Kernel 2422 - 'do_brk()' Local Privilege Es

What's this This project is mainly used to collect the exp for Linux platform privilege promotion, only to help penetration testers quickly achieve privilege promotion in actual combat Information CVE ID Description Kernels CVE-2004-0077 Linux Kernel 2420, 2224, 2425, 2426, 2427 CVE-2004-1235 Linux Kernel 2429 CVE-2005-0736 Linux Kernel 265, 267,

Linux Elevation(持续更新)

Linux Elvation This project is for Linux Elvation Vulnerable list #CVE  #Description  #Kernels CVE-2020-9470[Wing FTP Server 625 - Privilege Escalation] CVE-2020-8635[Wing FTP Server 623 - Privilege Escalation] CVE-2020-8835[Linux Kernel 54 or Linux Kernel 54] CVE-2019-7304 [2342ubuntu01 or 2355+18101] CVE-2019-13272 [Linux kernel before 5117]

References

CWE-264http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc1http://www.openwall.com/lists/oss-security/2009/04/17/3http://patchwork.kernel.org/patch/16544/http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=432870dab85a2f69dc417022646cb9a70acf7f94http://marc.info/?l=linux-kernel&m=123560588713763&w=2http://www.openwall.com/lists/oss-security/2009/04/07/1https://bugzilla.redhat.com/show_bug.cgi?id=493771http://www.redhat.com/support/errata/RHSA-2009-0451.htmlhttp://secunia.com/advisories/34917http://secunia.com/advisories/34981http://www.debian.org/security/2009/dsa-1787http://www.debian.org/security/2009/dsa-1794http://secunia.com/advisories/35011http://www.securitytracker.com/id?1022141http://rhn.redhat.com/errata/RHSA-2009-0473.htmlhttp://secunia.com/advisories/35015http://www.redhat.com/support/errata/RHSA-2009-1024.htmlhttp://secunia.com/advisories/35121http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.htmlhttp://www.debian.org/security/2009/dsa-1800http://wiki.rpath.com/Advisories:rPSA-2009-0084http://www.mandriva.com/security/advisories?name=MDVSA-2009:119http://secunia.com/advisories/35185https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.htmlhttp://secunia.com/advisories/35226http://secunia.com/advisories/35160http://secunia.com/advisories/35120http://www.redhat.com/support/errata/RHSA-2009-1077.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.htmlhttp://secunia.com/advisories/35390http://secunia.com/advisories/35394http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.htmlhttp://www.securityfocus.com/bid/34405http://www.mandriva.com/security/advisories?name=MDVSA-2009:135http://secunia.com/advisories/35387https://rhn.redhat.com/errata/RHSA-2009-1550.htmlhttp://secunia.com/advisories/37471http://www.vmware.com/security/advisories/VMSA-2009-0016.htmlhttp://www.vupen.com/english/advisories/2009/3316http://www.ubuntu.com/usn/usn-793-1http://secunia.com/advisories/35656http://secunia.com/advisories/35324https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8295https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11206https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10919http://www.securityfocus.com/archive/1/512019/100/0/threadedhttp://www.securityfocus.com/archive/1/507985/100/0/threadedhttp://www.securityfocus.com/archive/1/503610/100/0/threadedhttps://access.redhat.com/errata/RHSA-2009:1024https://nvd.nist.govhttps://www.exploit-db.com/exploits/8369/https://usn.ubuntu.com/793-1/https://www.securityfocus.com/bid/34405