| Name | CVE-2005-0178 |
| Description | Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| kernel-source-2.4.27 | source | (unstable) | (not affected) | |||
| kernel-source-2.6.8 | source | sarge | 2.6.8-14 | |||
| linux-2.6 | source | (unstable) | (not affected) |
- kernel-source-2.4.27 <not-affected> (v2.4 is safe because back there current->signal was not shared.)
- linux-2.6 <not-affected> (Fixed before upload into archive; 2.6.8.1)