Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2009-4033

Published: 8 December 2009

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.

Priority

Medium

Status

Package Release Status
acpid
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
hardy Not vulnerable
(RH patch)
intrepid Not vulnerable

jaunty Not vulnerable

karmic Not vulnerable

upstream Not vulnerable
(RH patch)