Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rvqj-x8r2-p6fr

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

Ссылки

EPSS

Процентиль: 44%
0.00215
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

redhat
больше 16 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

nvd
больше 16 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

debian
больше 16 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows lo ...

fstec
больше 16 лет назад

Уязвимость операционной системы Linux, позволяющая нарушителю отправлять сигналы привилегированным процессам

EPSS

Процентиль: 44%
0.00215
Низкий