Описание
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2009-0028
- https://bugzilla.redhat.com/show_bug.cgi?id=479932
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11187
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7947
- http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
- http://osvdb.org/52204
- http://rhn.redhat.com/errata/RHSA-2009-0459.html
- http://scary.beasts.org/security/CESA-2009-002.html
- http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-signal-vulnerability.html
- http://secunia.com/advisories/33758
- http://secunia.com/advisories/34033
- http://secunia.com/advisories/34680
- http://secunia.com/advisories/34917
- http://secunia.com/advisories/34962
- http://secunia.com/advisories/34981
- http://secunia.com/advisories/35011
- http://secunia.com/advisories/35120
- http://secunia.com/advisories/35121
- http://secunia.com/advisories/35390
- http://secunia.com/advisories/35394
- http://secunia.com/advisories/37471
- http://wiki.rpath.com/Advisories:rPSA-2009-0084
- http://www.debian.org/security/2009/dsa-1787
- http://www.debian.org/security/2009/dsa-1794
- http://www.debian.org/security/2009/dsa-1800
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:118
- http://www.redhat.com/support/errata/RHSA-2009-0326.html
- http://www.redhat.com/support/errata/RHSA-2009-0451.html
- http://www.securityfocus.com/archive/1/503610/100/0/threaded
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/bid/33906
- http://www.ubuntu.com/usn/usn-751-1
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2009/3316
EPSS
CVE ID
Связанные уязвимости
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
The clone system call in the Linux kernel 2.6.28 and earlier allows lo ...
Уязвимость операционной системы Linux, позволяющая нарушителю отправлять сигналы привилегированным процессам
EPSS