Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-0028

Опубликовано: 27 фев. 2009
Источник: debian
EPSS Низкий

Описание

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.29-1package
linux-2.6.24removedpackage

EPSS

Процентиль: 44%
0.00215
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

redhat
больше 16 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

nvd
больше 16 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

github
около 3 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

fstec
больше 16 лет назад

Уязвимость операционной системы Linux, позволяющая нарушителю отправлять сигналы привилегированным процессам

EPSS

Процентиль: 44%
0.00215
Низкий