Количество 7
Количество 7

CVE-2009-0028
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

CVE-2009-0028
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

CVE-2009-0028
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
CVE-2009-0028
The clone system call in the Linux kernel 2.6.28 and earlier allows lo ...
GHSA-rvqj-x8r2-p6fr
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.

BDU:2016-02228
Уязвимость операционной системы Linux, позволяющая нарушителю отправлять сигналы привилегированным процессам
ELSA-2009-0326
ELSA-2009-0326: kernel security and bug fix update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2009-0028 The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit. | CVSS2: 2.1 | 0% Низкий | больше 16 лет назад |
![]() | CVE-2009-0028 The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit. | CVSS2: 2.1 | 0% Низкий | больше 16 лет назад |
![]() | CVE-2009-0028 The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit. | CVSS2: 2.1 | 0% Низкий | больше 16 лет назад |
CVE-2009-0028 The clone system call in the Linux kernel 2.6.28 and earlier allows lo ... | CVSS2: 2.1 | 0% Низкий | больше 16 лет назад | |
GHSA-rvqj-x8r2-p6fr The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit. | 0% Низкий | около 3 лет назад | ||
![]() | BDU:2016-02228 Уязвимость операционной системы Linux, позволяющая нарушителю отправлять сигналы привилегированным процессам | CVSS2: 2.1 | 0% Низкий | больше 16 лет назад |
ELSA-2009-0326 ELSA-2009-0326: kernel security and bug fix update (IMPORTANT) | около 16 лет назад |
Уязвимостей на страницу