Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-0028

Опубликовано: 25 фев. 2009
Источник: redhat
CVSS2: 2.1
EPSS Низкий

Описание

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=479932Linux kernel minor signal handling vulnerability

EPSS

Процентиль: 44%
0.00215
Низкий

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
больше 16 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

nvd
больше 16 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

debian
больше 16 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows lo ...

github
около 3 лет назад

The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

fstec
больше 16 лет назад

Уязвимость операционной системы Linux, позволяющая нарушителю отправлять сигналы привилегированным процессам

EPSS

Процентиль: 44%
0.00215
Низкий

2.1 Low

CVSS2