Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-0028

Опубликовано: 25 фев. 2009
Источник: redhat
CVSS2: 2.1

Описание

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=479932Linux kernel minor signal handling vulnerability

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
почти 17 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

nvd
почти 17 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

debian
почти 17 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows lo ...

github
почти 4 года назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

fstec
почти 17 лет назад

Уязвимость операционной системы Linux, позволяющая нарушителю отправлять сигналы привилегированным процессам

2.1 Low

CVSS2